Complexity measures for public-key cryptosystems

نویسنده

  • Joachim Grollmann
چکیده

A b s t r a c t The f i r s t p a r t of t h i s paper g i v e s r e s u l t s about promise problems. A "promise problem" i s a formulation of a p a r t i a l d e c i s i o n problem t h a t i s u s e f u l f o r d e s c r i b i n g cracking problems f o r public-key cryptosystems (PKCS). We prove t h a t every NP-hard promise problem i s uniformly NP-hard, and w e show t h a t a number of r e s u l t s and a c o n j e c t u r e about promise problems a r e e q u i v a l e n t t o s e p a r a b i l-i t y a s s e r t i o n s t h a t a r e t h e n a t u r a l analogues of well-known r e s u l t s i n c l a s s i c a l r e c u r s i o n theory. The c o n j e c t u r e , i f i t i s t r u e , i m p l i e s nonexistence of PKCS having NP-hard cracking problems. The second p a r t of t h e paper s t u d i e s more a p p r o p r i a t e measures f o r PKCS. Among t h e r e s u l t s obtained are t h e following: One-way f u n c t i o n s e x i s t i f and only i f P # such t h a t range f E P e x i s t i f and only i f U n CO-U # P. It w i l l follow t h a t t h e r e e x i s t PKCS t h a t cannot be cracked i n polynomial t i m e …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient elliptic curve cryptosystems

Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

Public-key cryptography and invariant theory

Public-key cryptosystems are suggested based on invariants of groups. We give also an overview of known cryptosystems which involve groups.

متن کامل

Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems

It is widely believed to take exponential time to find a solution of a system of random multivariate polynomials because of the NP-completeness of such a task. On the other hand, in most of multivariate public key cryptosystems proposed so far, the computational complexity of cryptanalysis is apt to be polynomial time due to the trapdoor structure. In this paper, we develop the concept, piece i...

متن کامل

Secure and Fast Digital Signatures using BCH Codes

Since the introduction of public key cryptography in the 70’s [1], many cryptosystems have been proposed and many cryptographic schemes have been broken. The most used cryptosystems rely on number theory problem like the factorization problem [3] and the discrete logarithm over suitable group [2]. The McEliece cryptosystem [5] and the Neiderreiter variante [6] rely on coding theory, they are on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • SIAM J. Comput.

دوره 17  شماره 

صفحات  -

تاریخ انتشار 1984