Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range
نویسندگان
چکیده
The Chor-Rivest cryptosystem, based on a high-density knapsack problem on a finite field Fqh , was broken by S. Vaudenay for q ≈ 200, h ≈ 24, and h admitting a factor s verifying a certain condition. A new set of parameters q and h, which prevent this cryptosystem against Vaudenay’s attack, is presented and the computational aspects of its implementation in the Magma computational algebra system are analyzed.
منابع مشابه
Algorithms to encrypt and decrypt messages with Magma ∗
The security in current communications recommend to develop the implementation of cryptographic primitives and algorithms in an effective way. The cryptosystem proposed by Chor and Rivest, which is based on the knapsack problem, has recently been broken by Vaudenay but only when the original parameters are used. In this paper we give a brief overview of some developments in Cryptography and we ...
متن کاملSafer parameters for the Chor-Rivest cryptosystem
Vaudenay’s cryptanalysis to Chor-Rivest cryptosystem is not applicable if the parameters p and h of the finite field are both prime integers. This case is analyzed below and the parameters for which such cryptosystem is cryptographically interesting are listed. Regrettably the resulting cryptosystems are not very efficient in practice.
متن کاملe-LEARNING: A CASE STUDY OF CHOR-RIVEST CRYPTOSYSTEM IN MAPLE
A new experience teaching programming and numerical methods to engineering students, using Maple to implement the Chor-Rivest cryptosystem, is shown. The aim is to give the students a better understanding of cryptography by using Maple software. In this paper we discuss our attempts to structure an on-line course that required the students participation, interest, and evaluation by means of a new
متن کاملAttacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction
We introduce algorithms for lattice basis reduction that are improvements of the famous L 3-algorithm. If a random L 3 {reduced lattice basis b1; : : : ; bn is given such that the vector of reduced Gram{ Schmidt coeecients (fi;jg 1 j < i n) is uniformly distributed in 0; 1) (n 2) , then the pruned enumeration nds with positive probability a shortest lattice vector. We demonstrate the power of t...
متن کاملEEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations
GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Inf. Sci.
دوره 179 شماره
صفحات -
تاریخ انتشار 2009