Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range

نویسندگان

  • Luis Hernández Encinas
  • Jaime Muñoz Masqué
  • Araceli Queiruga Dios
چکیده

The Chor-Rivest cryptosystem, based on a high-density knapsack problem on a finite field Fqh , was broken by S. Vaudenay for q ≈ 200, h ≈ 24, and h admitting a factor s verifying a certain condition. A new set of parameters q and h, which prevent this cryptosystem against Vaudenay’s attack, is presented and the computational aspects of its implementation in the Magma computational algebra system are analyzed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algorithms to encrypt and decrypt messages with Magma ∗

The security in current communications recommend to develop the implementation of cryptographic primitives and algorithms in an effective way. The cryptosystem proposed by Chor and Rivest, which is based on the knapsack problem, has recently been broken by Vaudenay but only when the original parameters are used. In this paper we give a brief overview of some developments in Cryptography and we ...

متن کامل

Safer parameters for the Chor-Rivest cryptosystem

Vaudenay’s cryptanalysis to Chor-Rivest cryptosystem is not applicable if the parameters p and h of the finite field are both prime integers. This case is analyzed below and the parameters for which such cryptosystem is cryptographically interesting are listed. Regrettably the resulting cryptosystems are not very efficient in practice.

متن کامل

e-LEARNING: A CASE STUDY OF CHOR-RIVEST CRYPTOSYSTEM IN MAPLE

A new experience teaching programming and numerical methods to engineering students, using Maple to implement the Chor-Rivest cryptosystem, is shown. The aim is to give the students a better understanding of cryptography by using Maple software. In this paper we discuss our attempts to structure an on-line course that required the students participation, interest, and evaluation by means of a new

متن کامل

Attacking the Chor-Rivest Cryptosystem by Improved Lattice Reduction

We introduce algorithms for lattice basis reduction that are improvements of the famous L 3-algorithm. If a random L 3 {reduced lattice basis b1; : : : ; bn is given such that the vector of reduced Gram{ Schmidt coeecients (fi;jg 1 j < i n) is uniformly distributed in 0; 1) (n 2) , then the pruned enumeration nds with positive probability a shortest lattice vector. We demonstrate the power of t...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sci.

دوره 179  شماره 

صفحات  -

تاریخ انتشار 2009