Cryptanalysis of a pay-as-you-watch system
نویسنده
چکیده
In this paper, we exhibit security flaws in MICROCAST payas-you-watch system. From the sole knowledge of public parameters, we show how any intruder is able to forge a coin and so to freely get access to the service. MICROCAST [2] includes a ‘pay-as-you-watch’ system for multicast content delivery. In this system, the bank acts as a certification authority. The bank setup goes as follows. Given a randomly chosen 160-bit prime q, two random 512-bit primes p1 and p2 are constructed so that q divides p1−1. Next, the RSA modulus n = p1p2 is formed and a matching pair of RSA public/private exponents (e, d) is computed according to ed ≡ 1 (mod φ(n)). Finally, a generator g ∈ (Z/nZ)∗ is computed so that the cyclic group 〈g〉 has order q. The public parameters are n, q, e, and g. The security of the micropayment system in MICROCAST —that is, the impossibility of coin forgery by an intruder— relies on the difficulty of finding a solution (A, p) to the equation PA ≡ g (mod n) (1) given P , x, g and n, and where P is an element of the form P = g mod n. In [2, § 4.1], the authors argue that the knowledge of a prime factor of p1 − 1 (namely, q) does not weaken the system. This claim is not justified. Indeed, since p2 is randomly chosen, it follows, with very high probability, that prime q does not divide p2 − 1. Therefore, from g q ≡ 1 (mod {p1, p2}), we deduce that g ≡ 1 (mod p2) and so g 6≡ 1 (mod p1), which yields gcd(g − 1, n) = p2 . Once the factorization of n is known, it becomes trivial to solve Eq. (1) by computing, for an arbitrary p, A = ( g P )x −1 mod (p1−1)(p2−1) mod n . An easy way that comes to mind for preventing the previous attack consists in choosing prime p2 such that q divides p2 − 1 and then in constructing g with
منابع مشابه
Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications
This paper addresses the problem of pay-as-you-watch services over unicast and multicast communications. For each communication model, we present two solutions, non-verifiable and verifiable, depending on the existence or non-existence of trust between the source and the receiver(s). In verifiable schemes, the source obtains a proof of correct reception by the receiver(s); in non-verifiable sch...
متن کاملFinancing Long-term Care: Some Ideas From Switzerland; Comment on “Financing Long-term Care: Lessons From Japan”
Ikegami reviews the implementation of mandatory long-term care insurance systems in Germany and Japan, which are organized as pay-as-you-go systems. I propose to go one step further and implement a multi-pillar, mandatory and voluntary long-term care financing system, which combines pay-as-you-go with capital-funded elements. The proposal is based on the observation tha...
متن کاملشبیه سازی یک الگوی نسل های همپوشان 55 دوره ای با رویکرد به سازی نظام بازنشستگی ایران
The ability of OLG models in analyzing and simulating the various fields of an economy, such as the investigation of endogenous growth policies, the development of intergenerational equity criteria and the reform of social security system, has caused these models to have a special position among economists in recent decades. However, difficulties in quantifying these models and analyzing their ...
متن کاملExtension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملA Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Process. Lett.
دوره 88 شماره
صفحات -
تاریخ انتشار 2003