Cryptanalysis of Improved Liaw's Broadcasting Cryptosystem

نویسندگان

  • Jaime Muñoz Masqué
  • Alberto Peinado
چکیده

A secure broadcasting cryptosystem must provide a secure communication channel from a sender to a group of legal or authorized receivers. Many of the proposed systems [3-5] require a large number of broadcast messages and present a number of problems. Moreover, Liaw [2] proposed a secure broadcasting scheme with fewer broadcasting messages, which allows easy insertion of new users into the active group. Later, Tseng and Jan [1] found several weaknesses in Liaw’s scheme and proposed a modification. The weaknesses detected in [1] allow intruders to obtain the master key by means of a conspiracy attack, thus breaking the security of the system. Moreover, Sun [7] proved that Liaw’s broadcasting cryptosystem cannot be operated because a very large amount of information (~2 bits) must be kept by each user and be sent for each broadcast. In the present paper, an inconsistency in the improvement proposed by Tseng and Jan in [1] is detected precluding its application. New attacks on the original and modified Liaw’s schemes [1, 2] are presented and a new modification is proposed which overcomes the conspiracy attack of Tseng and Jan. We also give our own cryptanalysis. This modification does not require keeping and broadcasting the very large amount of information pointed out in [7].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map

Recently, a novel block encryption system has been proposed as an improved version of the chaotic cryptographic method based on iterating a chaotic map. In this Letter, a flaw of this cryptosystem is pointed out and a chosen plaintext attack is presented. Furthermore, a remedial improvement is suggested, which avoids the flaw while keeping all the merits of the original cryptosystem. © 2006 Els...

متن کامل

Cryptanalysis of a Public-key Cryptosystem Using Lattice Basis Reduction Algorithm

In this paper, we proposed a new attack against Hwang et al.’s cryptosystem. This cryptosystem uses a super-increasing sequence as private key and the authors investigate a new algorithm called permutation combination algorithm to enhance density of knapsack to avoid the low-density attack. Sattar J. Aboud [Aboud j. Sattar, “An improved knapsack public key cryptography system”, International Jo...

متن کامل

Security Analysis and Implementation of an Improved Cch2 Proxy Multi-Signature Scheme

Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multi-signature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity and computational overhead of improved CCH1 and ...

متن کامل

Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...

متن کامل

CAES Cryptosystem: Advanced Security Tests and Results

A robust and secure cryptosystem is an encrypting system that resists against all practical cryptanalysis methods such as statistical attacks, differential cryptanalysis and linear cryptanalysis. To prove the resistance against these attacks, the cryptosystem designer must carry out a list of robustness tests. Considering these constraints, we present in the current paper results of robustness ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Inf. Sci. Eng.

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2006