Lecture 8 : Trapdoor Permutations and Discrete Log
نویسنده
چکیده
Recall that RSA is a candidate trapdoor permutation (TDP) with the following algorithms: • Key-generation: On input 1, – Pick two k-bit primes p and q and let N = pq. – Find e relatively prime to φ(pq) = (p− 1)(q − 1) – Let d be such that ed ≡ 1 mod φ(N = pq). Recall that φ() is the Euler’s totient function. Such a d exists since e is relatively prime to N – Output PK = (N, e) and SK = d • Eval(PK , x): If x / ∈ ZN fail, else output x mod N • Invert(PK ,SK , y): If y / ∈ ZN , fail else output y mod N RSA is a permutation and Invert() is correct, that is ∀x ∈ ZN Invert((N, e), d,Eval((N, e), x)) = x We will try to see why the correctness holds. Recall Lagrange’s theorem: Theorem 1 (Lagrange). Let H,G be finite groups under the same operation such that H ⊆ G then the cardinality of H divides the cardinality of G that is, #H | #G Theorem 2 (Euler). If a and N are relatively prime then a ≡ 1 mod N Since ed ≡ 1 mod φ(N), we have that ed = lφ(N) + 1 for some l. By Euler’s theorem, we have that x ≡ 1 mod N . (From now on, we will implicitly assume mod N when we are dealing with elements of ZN ) (x) = x = x = x.x = x
منابع مشابه
K — Advanced Topics in Cryptography February 5 , 2004 Lecture 4
The focus of this lecture is efficient public-key encryption. In the previous lecture, we discussed a public-key encryption scheme for 1-bit messages. However, to encrypt an `-bit message, we can simply encrypt ` one-bit messages and send these (and we proved last time that this remains secure in the case of public-key encryption). Here, we first describe (briefly) how to combine public and pri...
متن کاملGeneralized Environmental Security from Number Theoretic Assumptions
We address the problem of realizing concurrently composable secure computation without setup assumptions. While provably impossible in the UC framework of [Can01], Prabhakaran and Sahai had recently suggested a relaxed framework called generalized Environmental Security (gES) [PS04], as well as a restriction of it to a “client-server” setting based on monitored functionalities [PS05]. In these ...
متن کامل- 81 - Foundations of Cryptography
1. One Way Permutations with Trapdoor We recall the definition of a one-way functions with trapdoor as introduced in lecture 3. We consider a set of one-way permutations {fi:Di→Di} , i∈I⊆{0,1}* where the Di are finite domains, and I is some index set. example: in RSA scheme the functions are { f (N,e):ZN * →ZN }, where N =p .q for primes p,q and e is relatively prime with φ(N). The functions fi...
متن کامل624 The reduced Enigma
A fully working reduced Enigma has been used very successfully in numerous public lectures, in school talks, and in university seminars. Hands-on demonstrations of the reduced Enigma dramatically brings alive ideas about design, codes, permutations and groups. As a working trapdoor function, the reduced Enigma also provides an unusually clear introduction to public key cryptography. This articl...
متن کاملThe Security of All Bits Using List Decoding
The relation between list decoding and hard-core predicates has provided a clean and easy methodology to prove the hardness of certain predicates. So far this methodology has only been used to prove that the O(log log N) least and most significant bits of any function with multiplicative access —which include the most common number theoretic trapdoor permutations— are secure. In this paper we s...
متن کامل