On a Family of Minimal Candidate One-way Functions and One-way Permutations

نویسنده

  • Danilo Gligoroski
چکیده

In order to achieve computational workload equivalent to the exhaustive key search of an n-bit key for inversion of RSA or Diffie-Hellman one-way candidate functions the length of their arguments have to have from 10n to 60n bits. One-way functions based on Elliptic Curves in this moment are holding the record, demanding only 2n bits for their arguments. In this paper we propose a definition and construction of a new family of one-way candidate functions RN : Q → Q , where Q = {0, 1, . . . , s− 1} is an alphabet with s elements. Special instances of these functions can be permutations (i.e. one-way permutations). These one-way functions have the property that for achieving the security level equivalent of exhaustive key search of n-bit key, only n bits of input are needed.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations

In this paper we propose a definition and construction of a new family of one-way candidate functions RN : Q N → Q , where Q = {0, 1, . . . , s− 1} is an alphabet with s elements. Special instances of these functions can have the additional property to be permutations (i.e. one-way permutations). These one-way functions have the property that for achieving the security level of 2 computations i...

متن کامل

Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation

We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and one-way functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candid...

متن کامل

On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations

One of the fundamental research themes in cryptography is to clarify what the minimal assumptions to realize various kinds of cryptographic primitives are, and up to now, a number of relationships among primitives have been investigated and established. Among others, it has been suggested (and sometimes explicitly claimed) that a family of one-way trapdoor permutations (TDP) is sufficient for c...

متن کامل

Perfect Structure on the Edge of Chaos

We construct trapdoor permutations based on (sub-exponential) indistinguishability obfuscation and oneway functions, thereby providing the first candidate that is not based on the hardness of factoring. Our construction shows that even highly structured primitives, such as trapdoor permutations, can be potentially based on hardness assumptions with noisy structures such as those used in candida...

متن کامل

On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives

We know that trapdoor permutations can be used to construct all kinds of basic cryptographic primitives, including trapdoor functions, public-key encryption, private information retrieval, oblivious transfer, key agreement, and those known to be equivalent to one-way functions such as digital signature, private-key encryption, bit commitment, pseudo-random generator and pseudo-random functions....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • I. J. Network Security

دوره 8  شماره 

صفحات  -

تاریخ انتشار 2009