Computing information on domain parameters from public keys selected uniformly at random

نویسنده

  • Martin Ekerå
چکیده

The security of many cryptographic schemes and protocols rests on the conjectured computational intractability of the discrete logarithm problem in some group 〈g〉 of prime order. Such schemes and protocols require domain parameters that specify 〈g〉 and a specific generator g. In this paper we consider the problem of computing information on the domain parameters from public keys selected uniformly at random from 〈g〉. We show that it is not possible to compute any information on the generator g regardless of the number of public keys observed. In the case of elliptic curves E(Fp) or E(F2n) on short Weierstrass form, or E(K) on Edwards form, twisted Edwards form or Montgomery form, where K is a non-binary field, we show how to compute the domain parameters excluding the generator from four keys on affine form. Hence, if the domain parameters excluding the generator are to be kept private, points may not be transmitted on affine form. It is an open question whether point compression is a sufficient requirement. Regardless of whether points are transmitted on affine or compressed form, it is in general possible to create a distinguisher for the domain parameters, excluding the generator, both in the case of the elliptic curve groups previously mentioned, and in the case of subgroups of Fp. We propose that a good method for preventing all of the above attacks may be to use blinding schemes, and suggest new applications for existing blinding schemes originally designed for steganographic applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys

The authentication code (A-code) is the one of the most fundamental cryptographic protocols in information-theoretic cryptography, and it provides information-theoretic integrity or authenticity, i.e., preventing information from being altered or substituted by the adversary having unbounded computational powers. In addition, it has a wide range of applications such as multiparty computations a...

متن کامل

On reusing ephemeral keys in Diffie-Hellman key agreement protocols

A party may choose to reuse ephemeral public keys in a Diffie-Hellman key agreement protocol in order to reduce its computational workload or to mitigate against denial-of-service attacks. In this note we highlight the danger of reusing ephemeral keys if domain parameters are not appropriately selected or if public keys are not appropriately validated.

متن کامل

Practical and Secure E-Mail System (PractiSES)

In this paper, a practical and secure e-mail system (called “PractiSES”) that performs public key distribution and management in a unique way is proposed. PractiSES is a network of several domains. At the domain level, a designated PractiSES server, which is trusted by all users of that domain, distributes the public keys. If a user needs another user’s public key at a different domain, then in...

متن کامل

Connectivity of inhomogeneous random key graphs intersecting inhomogeneous Erdős-Rényi graphs

We study the connectivity of a random graph formed by the intersection of an inhomogeneous random key graph with an inhomogeneous Erdős-Rényi graph. The former graph is naturally induced by a heterogeneous random key predistribution scheme introduced for securing wireless sensor network communications. In this scheme, nodes are divided into r classes according to a probability distribution μ = ...

متن کامل

Make a Secure Connection Using Elliptic Curve Digital Signature

It is generally accepted that data encryption is the key role in current and future technologies. Many Public key cryptography schemes were presented, divided into different classes depending on a specific mathematical problem. Cryptography plays an important task in accomplishing information security. It is used for encrypting or signing data at the source before transmission, and then decrypt...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015