Catálogo de publicaciones - libros
Progress in Cryptology: Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings
Ed Dawson ; Serge Vaudenay (eds.)
En conferencia: 1º International Conference on Cryptology in Malaysia (Mycrypt) . Kuala Lumpur, Malaysia . September 28, 2005 - September 30, 2005
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Coding and Information Theory; Computer Communication Networks; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2005 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-28938-8
ISBN electrónico
978-3-540-32066-1
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2005
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2005
Cobertura temática
Tabla de contenidos
doi: 10.1007/11554868_1
Trends and Challenges for Securer Cryptography in Practice
Hideki Imai
As the importance of information security is widely recognized today, development of cryptography in practical use is rapidly taking place. On the other hand, however, many cases have been reported, where problems are found in the cryptographic systems already in use, or where the cryptographic systems are broken. Causes for a cryptographic system to get corrupted can be: defects in cryptographic algorithm designs; defects in implementation; defects in attack models and definitions of security; progress in computers and attack algorithms; inapplicability due to the change of environment. It is to be noted that the cryptographic system that has been created in the circumstance where there can be some kind of defects is generally vulnerable to breakdown. In the world of cryptography, we should regard ”Anything that can happen, happens.”
- Invited Talk I | Pp. 1-1
doi: 10.1007/11554868_2
Distinguishing Attacks on T-Functions
Simon Künzli; Pascal Junod; Willi Meier
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function and a previously unbroken multi-word T-function with a 256-bit state, we describe an efficient distinguishing attack having a 2 data complexity. Furthermore, Hong recently proposed two fully specified stream ciphers, consisting of multi-word T-functions with 128-bit states and filtering functions. We describe distinguishing attacks having a 2 and a 2 data complexity, respectively. The attacks have been implemented.
- Stream Ciphers Analysis | Pp. 2-15
doi: 10.1007/11554868_3
Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity
Frederik Armknecht; Gwénolé Ars
Algebraic attacks have established themselves as a powerful method for the cryptanalysis of LFSR-based keystream generators (e.g., used in Bluetooth). The attack is based on solving an overdetermined system of low-degree equations =0, where is an expression in the state of the LFSRs at clock and one or several successive keystream bits ,...,.
In fast algebraic attacks, new equations of a lower degree are constructed in a precomputation step. This is done by computing appropriate linear combinations of successive initial equations =0. The successive data complexity of the attack is the number of successive equations.
We propose a new variant of fast algebraic attacks where the same approach is employed to eliminate some unknowns, making a divide-and-conquer attack possible. In some cases, our variant is applicable whereas the first one is not.
Both variants can have a high successive data complexity (e.g., ≥ 8.822.188 for ). We describe how to keep it to a minimum and introduce suitable efficient algorithms for the precomputation step.
- Stream Ciphers Analysis | Pp. 16-32
doi: 10.1007/11554868_4
Equivalent Keys in HFE, C, and Variations
Christopher Wolf; Bart Preneel
In this article, we investigate the question of equivalent keys for two ultivariate uadratic public key schemes HFE and C and improve over a previously known result, which appeared at PKC 2005. Moreover, we show a new non-trivial extension of these results to the classes HFE-, HFEv, HFEv-, and C, which are cryptographically stronger variants of the original HFE and C schemes. In particular, we are able to reduce the size of the private — and hence the public — key space by at least one order of magnitude and several orders of magnitude on average. While the results are of independent interest themselves as they broaden our understanding of ultivariate uadratic schemes, we also see applications both in cryptanalysis and in memory efficient implementations.
- Cryptography Based on Combinatorics | Pp. 33-49
doi: 10.1007/11554868_5
A New Structural Attack for GPT and Variants
Raphael Overbeck
In this paper we look at the Gabidulin version of the McEliece cryptosystem (GPT) and its variants. We propose a new polynomial time attack, which recovers an alternative private key. Our attack is applicable to all variants proposed so far and breaks some of them completely.
- Cryptography Based on Combinatorics | Pp. 50-63
doi: 10.1007/11554868_6
A Family of Fast Syndrome Based Cryptographic Hash Functions
Daniel Augot; Matthieu Finiasz; Nicolas Sendrier
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using similar constructions can however still be considered secure. Nevertheless, this has drawn attention on the need for new hash function designs.
In this article is presented a family of secure hash functions, whose security is directly related to the syndrome decoding problem from the theory of error-correcting codes.
Taking into account the analysis by Coron and Joux [4] based on Wagner’s generalized birthday algorithm [19] we study the asymptotical security of our functions. We demonstrate that this attack is always exponential in terms of the length of the hash value.
We also study the work-factor of this attack, along with other attacks from coding theory, for non asymptotic range, i.e. for practical values. Accordingly, we propose a few sets of parameters giving a good security and either a faster hashing or a shorter description for the function.
- Cryptography Based on Combinatorics | Pp. 64-83
doi: 10.1007/11554868_7
Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing
Kun Peng; Colin Boyd; Ed Dawson
Although secret sharing techniques have been applied to implement secure electronic sealed-bid auction for a long time, problems and attacks still exist in secret-sharing-based electronic sealed-bid auction schemes. In this paper, a new secret-sharing-based first-bid e-auction scheme is designed to achieve satisfactory properties and efficiency. Correctness and fairness of the new auction are based on hard computation problems and do not depend on any trust. Complete bid privacy based on a threshold trust is achieved in the new scheme. Attacks to existing secret-sharing-based sealed-bid e-auction schemes are prevented.
- Cryptographic Protocols | Pp. 84-98
doi: 10.1007/11554868_8
Identity Based Delegation Network
Sherman S. M. Chow; Richard W. C. Lui; Lucas C. K. Hui; S. M. Yiu
Delegation of authorities is a common practice in various organizations. The way delegation is performed can be quite complicated. To capture possible delegation structures, the concept of is proposed, so that anyone can be convinced of who obtained delegation from whom in order to produce the final proxy signature. In this paper, we consider the delegation network for identity-based (ID-based) scenario. Since the public key is just a string denoting the user’s identity, certificate management is simplified. Proxy signature schemes have been devised to delegate signing authorities. We show that a trivial attempt of extending an existing ID-based proxy signature may result in an insecure scheme. After that we propose a building block of our ID-based delegation network, which is an ID-based proxy signature supporting batch verifications. Our proposed ID-based delegation network is flexible in the sense that the whole delegation network does not need to be known in advance. Our proposal is provably secure under the random oracle model.
- Cryptographic Protocols | Pp. 99-115
doi: 10.1007/11554868_9
On Session Key Construction in Provably-Secure Key Establishment Protocols
Kim-Kwang Raymond Choo; Colin Boyd; Yvonne Hitchcock
We examine the role of session key construction in provably-secure key establishment protocols. We revisit an ID-based key establishment protocol due to Chen & Kudla (2003) and an ID-based protocol 2P-IDAKA due to McCullagh & Barreto (2005). Both protocols carry proofs of security in a weaker variant of the Bellare & Rogaway (1993) model where the adversary is not allowed to make any Reveal query. We advocate the importance of such a (Reveal) query as it captures the known-key security requirement. We then demonstrate that a small change to the way that session keys are constructed in both protocols results in these protocols being secure without restricting the adversary from asking the Reveal queries in most situations. We point out some errors in the existing proof for protocol 2P-IDAKA, and provide proof sketches for the improved Chen & Kudla’s protocol. We conclude with a brief discussion on ways to construct session keys in key establishment protocols.
- Cryptographic Protocols | Pp. 116-131
doi: 10.1007/11554868_10
On the Security of Probabilistic Multisignature Schemes and Their Optimality
Yuichi Komano; Kazuo Ohta; Atsushi Shimbo; Shinichi Kawamura
We first prove that the following three probabilistic multisignature schemes based on a trapdoor permutation have tight security; PFDH (probabilistic full domain hash) based multisignature scheme (PFDH-MSS), PSS (probabilistic signature scheme) based multisignature scheme (PSS-MSS), and short signature PSS based multisignature scheme (S-PSS-MSS). Second, we give an optimal proof (general result) for multisignature schemes, which derives the lower bound for the length of random salt. We also estimate the upper bound for the length in each scheme and derive the optimal length of a random salt. Two of the schemes are promising in terms of security tightness and optimal signature length.
- Cryptographic Protocols | Pp. 132-150