Breaking a Cryptographic Protocol with Pseudoprimes
نویسنده
چکیده
The Miller-Rabin pseudo primality test is widely used in cryptographic libraries, because of its apparent simplicity. But the test is not always correctly implemented. For example the pseudo primality test in GNU Crypto 1.1.0 uses a fixed set of bases. This paper shows how this flaw can be exploited to break the SRP implementation in GNU Crypto. The attack is demonstrated by explicitly constructing pseudoprimes that satisfy the parameter checks in SRP and that allow a dictionary attack. This dictionary attack would not be possible if the pseudo primality test were correctly implemented. Often important details are overlooked in implementations of cryptographic protocols until specific attacks have been demonstrated. The goal of the paper is to demonstrate the need to implement pseudo primality tests carefully. This is done by describing a concrete attack against GNU Crypto 1.1.0. The pseudo primality test of this library is incorrect. It performs a trial division and a MillerRabin test with a fixed set of bases. Because the bases are known in advance an attacker can find composite numbers that pass the primality test with probability 1. A protocol implemented in GNU Crypto that requires a reliable primality test is SRP. The security of SRP depends on a group for which computing DL is hard. In SRP the server chooses the group parameters and sends them to the client. It is then important that the client verifies that computing DLs in the chosen group is indeed hard. Otherwise, the client could expose his password to a dictionary attack. This paper shows that the flaw in the GNU Crypto primality test indeed weakens the SRP implementation by explicitly constructing weak parameters for SRP. The weakness would not exist if a reliable primality test were implemented. 1 The Miller-Rabin pseudo primality test. A well-known Theorem by Fermat states that if n is a prime and b is coprime to n then b ≡ 1 (mod n) (1) Hence if Equation (1) is not satisfied for a pair (b, n) that is coprime then n is composite. Unfortunately, there also exist pairs (b, n) that satisfy Equation (1), but where n is composite. Composite numbers n that satisfy Equation (1) for all Breaking a Cryptographic Protocol with Pseudoprimes 11 b coprime to n are called Carmichael numbers. Korselt proposed the following criterion for such numbers [7]. Korselt’s criterion. A composite number n is a Carmichael number if and only if n is squarefree and all prime divisors p of n satisfy
منابع مشابه
Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملThe Pseudoprimes to 25 • 109
The odd composite n < 25 • 10 such that 2n_1 = 1 (mod n) have been determined and their distribution tabulated. We investigate the properties of three special types of pseudoprimes: Euler pseudoprimes, strong pseudoprimes, and Carmichael numbers. The theoretical upper bound and the heuristic lower bound due to Erdös for the counting function of the Carmichael numbers are both sharpened. Several...
متن کاملOn the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract)
We present a theoretical model for breaking various cryptographic schemes by taking advantage of random hardware faults. We show how to attack certain implementations of RSA and Rabin signatures. An implementation of RSA based on the Chinese Remainder Theorem can be broken using a single erroneous signature. Other implementations can be broken using a larger number of erroneous signatures. We a...
متن کاملFrobenius pseudoprimes
The proliferation of probable prime tests in recent years has produced a plethora of definitions with the word “pseudoprime” in them. Examples include pseudoprimes, Euler pseudoprimes, strong pseudoprimes, Lucas pseudoprimes, strong Lucas pseudoprimes, extra strong Lucas pseudoprimes and Perrin pseudoprimes. Though these tests represent a wealth of ideas, they exist as a hodge-podge of definiti...
متن کاملCipolla Pseudoprimes
We consider the pseudoprimes that M. Cipolla constructed. We call such pseudoprimes Cipolla pseudoprimes. In this paper we find infinitely many Lucas and Lehmer pseudoprimes that are analogous to Cipolla pseudoprimes.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005