Security and E ciency Analyses of Public Key Cryptosystems
نویسنده
چکیده
This thesis analyzes the security and e ciency of public key cryptosystems. New attacks for several cryptosystems are proposed and the e ectiveness of the attacks is evaluated. Furthermore, solutions are given to several unsolved problems in computational number theory and algebraic geometry theory that are closely related to the security of public key cryptosystems. Moreover, new calculation methods are proposed to speed up encryption and decryption. This thesis consists of the following eight chapters. Chapter 1 is the introduction. We explain the main purpose of our studies and overview previous works related to our studies. Chapter 2 gives the preliminaries. We summarize the mathematics and cryptosystems appearing in this thesis. We analyze the security of several cryptosystems from Chapter 3 to Chapter 6. In Chapter 3, we investigate how the elliptic curve factoring method, which is an e cient attack for public key cryptosystems, especially RSA cryptosystem, can be speeded up. In Chapter 4, we analyze the security of a certain type of elliptic curve cryptosystem de ned over a composite modulus. We also investigate the di culty of a known problem | the problem of counting the number of points on an elliptic curve over the ring Z=nZ |. This problem is assumed to be as di cult to solve as the cryptosystem is to break. We prove that this problem is computationally equivalent to a factoring problem. In Chapter 5, we investigate the di culty of an elliptic curve discrete logarithm problem over a super-anomalous elliptic curve. We prove that this problem can be solved in deterministic polynomial time. In Chapter 6, the multi-variate RSA cryptosystem is de ned and its security and e ciency are evaluated. We prove that this cryptosystem can be broken under an unusual usage. In Chapter 7, we describe how to speed up public key cryptosystems. We propose new methods to generate short addition chains. Moreover, we evaluate their e ciency. Chapter 8 is the conclusion. We summarize results obtained in this thesis.
منابع مشابه
QTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملOn the theory and practice of quantum-immune cryptography
Public-key cryptography is a key technology for making the Internet and other IT infrastructures secure. The security of the established public-key cryptosystems relies on the di culty of factoring large composite integers or computing discrete logarithms. However, it is unclear whether these computational problems remain intractable in the future. For example, Shor showed in 1994 [71] that qua...
متن کاملEfficient elliptic curve cryptosystems
Elliptic curve cryptosystems (ECC) are new generations of public key cryptosystems that have a smaller key size for the same level of security. The exponentiation on elliptic curve is the most important operation in ECC, so when the ECC is put into practice, the major problem is how to enhance the speed of the exponentiation. It is thus of great interest to develop algorithms for exponentiation...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001