Refuting the Pseudo Attack on the REESSE1+ Cryptosystem
نویسندگان
چکیده
We illustrate through example 1 and 2 that the condition at theorem 1 in [8] dissatisfies necessity, and the converse proposition of fact 1.1 in [8] does not hold, namely the condition Z / M – L / Ak < 1 / (2 Ak ) is not sufficient for f (i) + f (j) = f (k). Illuminate through an analysis and ex.3 that there is a logic error during deduction of fact 1.2, which causes each of fact 1.2, 1.3, 4 to be invalid. Demonstrate through ex.4 and 5 that each or the combination of qu+1 > qu ∆ at fact 4 and table 1 at fact 2.2 is not sufficient for f (i) + f (j) = f (k), property 1, 2, 3, 4, 5 each are invalid, and alg.1 based on fact 4 and alg.2 based on table 1 are disordered and wrong logically. Further, manifest through a repeated experiment and ex.5 that the data at table 2 is falsified, and the example in [8] is woven elaborately. We explain why Cx ≡ Ax W f(x) (% M) is changed to Cx ≡ (Ax W ) (% M) in REESSE1+ v2.1. To the signature fraud, we point out that [8] misunderstands the existence of T –1 and Q –1 % (M – 1), and forging of Q can be easily avoided through moving H. Therefore, the conclusion of [8] that REESSE1+ is not secure at all (which connotes that [8] can extract a related private key from any public key in REESSE1+) is fully incorrect, and as long as the parameter Ω is fitly selected, REESSE1+ with Cx ≡ Ax W f(x) (% M) is secure.
منابع مشابه
Cryptanalysis of REESSE1+ Public Key Cryptosystem
A new public key cryptosystem, called REESSE1+, was proposed. REESSE1 consists of two primitive algorithms, a public key encryptio/decryption algorithm and a digital signature algorithm. We give some analysis to REESSE1+, and show that the system is totally unsecure. We show how to derive the private key from the public key. As the same time, we also show how to forge signatures for any message...
متن کاملA Lever Function to a New Codomain with Adequate Indeterminacy
The key transforms of the REESSE1+ cryptosystem is Ci ≡ (Ai W ) (% M) with l(i) ∈ Ω = {5, 7, ..., 2n + 3} for i = 1, ..., n, where l(i) is called a lever function. In this paper, the authors give a new codomain Ω± ⊂ {±5, ..., ±(n + 4)} and subjected to x + y ≠ 0 ∀ x, y ∈ Ω±, where “±x” means the coexistence of “+x” and “−x”, which indicates that Ω± is indeterminate. Then, discuss the necessity ...
متن کاملOn the computational complexity of finding a minimal basis for the guess and determine attack
Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...
متن کاملREESSE1+ . Reward . Proof by Experiment
The authors discuss what is provable security in cryptography. Think that provable security is asymptotic, relative, and dynamic, and only a supplement to but not a replacement of exact security analysis. Because the conjecture P ≠ NP has not been proven yet, and it is possible in terms of the two incompleteness theorems of Kurt Gödel that there is some cryptosystem of which the security cannot...
متن کاملDesign and Analysis of the REESSE1+ Public Key Cryptosystem v2.21
In this paper, the authors give the definitions of a coprime sequence and a lever function, and describe the five algorithms and six characteristics of a prototypal public key cryptosystem which is used for encryption and signature, and based on three new problems and one existent problem: the multivariate permutation problem (MPP), the anomalous subset product problem (ASPP), the transcendenta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/0704.0492 شماره
صفحات -
تاریخ انتشار 2007