One Key to Rule Them All
نویسنده
چکیده
We show how to specify an elliptic curve public key, RSA public key and DSA public key all in a single 2048 bit block. The method gives a wide choice of nite elds and curves for use in the ECC system and introduces no known security weaknesses. The method hence allows algorithm type to be decided at run time, rather than at the time the public keys are distributed. However, this is done without the need for very large key lengths. Suppose Alice wishes to publish her public key in some directory, so that someone else, say Bob, can verify Alice's digital signatures, or send Alice secret messages. At present Alice rst has to decide on which of the three standard public key algorithms to use: RSA, DSA or ECC. Given this Alice then passes to the directory, or CA, the bit pattern which represents her public key for that given algorithm. If Alice wished to keep the choice of algorithm open, until the key was actually used, then she would need to give the bit patterns of three independent public keys. Such a situation could arise where we do not know how the public key is to be used. For example, if Bob is going to verify signatures from Alice, or send messages to Alice, using a small constrained device then RSA is probably to be preferred as the public key operations are much faster with RSA. If however, Alice's operations, whether signing or decryption, are to be performed on a small constrained device then ECC is probably to be the preferred option. There may even be some situations where DSA is the preferred option. In any case if Alice wishes to make available all three public keys in the directory then, with current recommendations for key sizes, she will require 1024 bits to specify her RSA key, another 1024 bits to specify her DSA key (assuming a preagreed nite eld is used) and another 170 bits to specify an ECC public key (assuming a preagreed curve is used). Hence a total of 2218 bits are required. If the system require that users should use di erent nite elds for DSA or di erent curves for ECC then the number of bits required increases, to at least 3500. In fact Alice may prefer to use elliptic curves over odd characteristic elds, since Alice may be using a PC based environment to perform her operations in. Whilst another user may prefer elliptic curves over even characteristic elds, since they may be using a dedicated hardware device. It is also known that using the same nite eld for DSA over a large number of users creates an attractive weakness which could be exploited by an admittedly rich adversary. If all three keys where stored in their standardized ASN.1 notation then the amount of storage required would be even larger. Another problem with using separate keys occurs in the (admittedly) unlikely event that one of the three main public key algorithms falls to an as yet unknown attack. If this \doomsday" scenario occurred then all public keys and the associated public key infrastructure would need to be revoked and redeployed for all keys which used the given public key algorithm. If however a public key was used which did
منابع مشابه
A Critical Study on the Theories of Environmental Ethics With the Rule of Basit al-Haqiqah
A philosophical rule which is of prime importance in transcendent wisdom is the rule expressed as “ basit ul-haqiqah koll ul-ashya wa laysat bi shayin minha, the simple truth is all things and, at the same time, it is none of them”. Although the philosophical rule is essentially for adducing the unity of God, it has other applications which could be obtained through enumerating its latent featu...
متن کاملحق حیات جنین نابهنجار از منظر اخلاق انسانی و منافع عمومی
Human Genomes including genomes being effective and creative in all human behavior and physical changes have been adverted in last decade more than ever. The subject nowadays by identification of genomes’ functions and forecast possibility of their effects on aborning children and appearing the idea of prevention of their negative effects occurrence and even curbing of patient -physically...
متن کاملMuhammadien Reality and the Transcendent Theosophy
The rules of al-wahid and imkan-i ashraf are among the important rules of Islamic philosophy according to which the emanation of the intellect from the Divine Essence as the first intellect is necessary. The Prophet is the core of being, the mediator of the origination, the order of creation and the subsistence and the return of all beings. He is the same perfect man who imparted divine effu...
متن کاملنقش امر به معروف و نهی از منکر در سلامت محیط
Background and Objective: Despite rapid progresses in field of proflactive and treatment measures as well as controlling disease, and their positive effects on human societies, human are still suffering from many crisis due to lack of following prophet's teaching and morality. These crisises has profound effects on human health and spirit. The main factor to avoid such critical condition. is ...
متن کاملکاوشی در تعریف نهاد: ارزیابی رویکردهای متاخرِ بدیل در تعریف نهاد
Although the scheme and foundation of institutionalism is based on the concept of institution, but there is no common understanding and definition of institution; in fact, with their fundamentally distinct perceptions and approaches, different theoreticians have defined institution in different ways. Therefore, through a descriptive-analytical method, the present study seeks to conceptually cla...
متن کاملNumeric Multi-Objective Rule Mining Using Simulated Annealing Algorithm
Abstract as a single objective one. Measures like support, confidence and other interestingness criteria which are used for evaluating a rule, can be thought of as different objectives of association rule mining problem. Support count is the number of records, which satisfies all the conditions that exist in the rule. This objective represents the accuracy of the rules extracted from the da...
متن کامل