Implementation of Public-Key Cryptosystems on Android Mobiles

Total Page:16

File Type:pdf, Size:1020Kb

Implementation of Public-Key Cryptosystems on Android Mobiles PEOPLE’S DEMOCRATIC REPUBLIC OF ALGERIA MINISTRY OF HIGHER EDUCATION AND SCIENTIFIC RESEARCH : …………… Order N° UNIVERSITY of M’SILA FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Department of Computer Science Dissertation Submitted in fulfilment of the requirements for the degree of academic master in computing Domain: Mathematics and computer science Field: Computer science Option: Networks and distributed systems By: Tayoub Walid TOPIC Implementation of Public-Key Cryptosystems on Android Mobiles Defended publicly on: …./06/2013 by the jury consisted of: Mr. University of M'sila President. Mr. Noureddine Chikouche University of M'sila Supervisor. Dr. Linda Belabdelouahab Fernini University of M'sila Supervisor. Mr. University of M'sila Examiner. Academic year: 2012/2013 Acknowledgement To the great parents before being great professors whatever i say, i won't be able to express my deep thanks to the teaching staff in my faculty specially my supervisors Mr.Noureddine Chikouche and Dr. Linda Belabdelouahab Fernini who accepted to be my supervisors and helped and supported me with the necessary information in my dissertation. It is impossible for me to list their efforts in preparing me to be a great student in research. In addition, I would like to extend my gratitude to my colleague Lakehali Somia who helped me and showed me clearly her feeling of responsibility toward me. Really, I appreciate this. dedication Thanks to ALLAH in the first and last place. Greeting to the glorious souls of our immortal martyrs who sacrificed them selves to make our country best Our fathers and mothers are among Allah’s greatest gifts to us, let’s honor them with respect, love and appreciation and let us not forget them in our prayers. To my great mother “DJAMILA” and To my great father MOHAMED who has helped, supported, encouraged, advised and sacrificed a lot for us to be a good men, thank you about every thing. To my dear’s brothers Fatima, Hadjira, Abdelrazzak, Mustapha, Amel,Abderrahim, Yacine, who have assisted and shared me the good and the bad times in my life and aided me to pass the critical times. To the closest people L s, who shared with me this critical period of my life To my Education Friends b.Ahmed, B.Zaki, and special dedicate to my best friend Sami IBRAHIM who shared me best times in my life. Thanks to all of our families and our friends who have helped and supported us from near or far across our life... Thanks to you all SUMMARY Elements Page General introduction…………………………………………………………………………..…...1 First chapter 1. Introduction..................................................................................................................................3 2. Common goals in cryptography ..................................................................................................4 3. Definition of cryptography ..........................................................................................................4 4. Functionality of work cryptography ............................................................................................4 5. Encryption and decryption ... .......................................................................................................5 6. Conventional cryptography..........................................................................................................5 6.1 Caesar’s Cipher...............................................................................................................6 7. Key management and conventional encryption...................................................... .....................7 8. Public key cryptography......................................................................................... .....................7 9. Keys.............................................................................................................................................8 10. Digital signatures.............................................................................................;..........................9 11. Conclusion ...............................................................................................................................10 Second chapter 1. Introduction ……………………………………………….......................................................11 2. Integer factorization………………………………………........................................................11 2.1 Prime decomposition ……………………………......................................................12 2.2 Current state of the art ……………………………....................................................12 3. Algorithms of integer factorization ……………………….......................................................13 3.1 Algorithm: Trial Division ……………………………................................................13 3.2 Pseudo-code: Trial Division ……………………………............................................13 3.2.1 Algorithm: Fermat Factorization ………………..........................................13 4. Discrete logarithm problem …………………………………...................................................14 4.1 Example …………………………………………………...........................................14 4.2 Definition ……………………………………………….............................................15 4.3 Algorithms ………………………………………………...........................................16 4.4 Comparison with integer factorization …………………………………...…………16 4.5 Cryptography ………………………………………………………….….................16 5. Discrete logarithm records ………………………………………………………...…………..17 6. Elliptic Curves discrete logarithm problem ………………………………...….….…………..17 6.1 Problem definition ………………………………………………………...………...17 7. Conclusion ………………………………………………………………………….................19 Third chapter 1. Introduction………………………………………………………………...………………….20 2. The mathematics of the RSA public-key cryptosystems………………………...…………….21 2.1 Prime Generation and Integer Factorization…………………………….…................21 2.2 Modular Exponentiation and Roots……………………………………...…………...22 3. The RSA Cryptosystem…………………………………………………………....…………..23 3.1 RSA encryption…………………………………………………………....…………23 3.2 RSA decryption……………………………………………………...…….…………24 3.3 RSA signature………………………………………………………………………...24 3.4 RSA signature verifying………………………………………………....…………...24 4. The Rabin cryptosystem …………………………………………….…………............……...25 4.1 The Rabin key generation………………………………………….........……………26 4.2 The Rabin encryption………………………………………………..........………….26 4.3 The Rabin decryption……………………………………………………...…………26 5. The El Gamal Cryptosystem………………… ………………………………...……………...28 5.1 The Discrete Logarithm………………………………………...…………………….28 5.2 El Gamal Encryption……………………………………………………...………….29 5.3 El Gamal Decryption……………………………………………………..…..............29 5.4 El Gamal signature …………………………………………………………..............29 5.5 El Gamal signature verification ………………………………………….…..............30 6. Elliptic Curve Cryptosystem (ECC) …………….…………………………………….………30 6.1 Elliptic Curve Cryptography…………………………………………….…………...30 6.1.1 EC on Prime field Fp…………………………………………..……...........31 6.1.2 EC on Binary field F2m …………………………………………..………..31 6.1.3 ECC encryption/ decryption …………………………….……..…..………32 6.1.4 ECC signature…………………………………………………..…..............32 6.1.4.1 Signing …………………………………………..……...……..32 6.1.4.2 Verifying…………………………………………..……….……..33 7. The NTRU cryptosystem…………………………………………………..….….……………33 7.2 Mathematical concepts …………………………………………..…….….…………33 7.3 NTRU key pair generation………………………………………..………..………...34 7.4 NTRU Encryption…………………………………………………..…….…………..34 7.5 NTRU Decryption……………………………………………………..…..…………34 7.6 NTRU Signature……………………………………………………………...............35 8. Conclusion………………………………………………………………………………..........37 Fourth chapter 1. Introduction ……………………………………………………………………….…………..38 2. The developpement environnement …………………………………………….…..................38 2.1 Key Terms ………………………………………………………….……...………...38 2.2 Eclipse ……………………………………………………………….………………38 2.3 Android……………………………………………………………..……...…………39 2.4 Installation and Configuration ……………………………………..………………...40 2.4.1 Download Android SDK …………………………………...………...........40 2.4.2 Install ADT plugin for eclipse ………………………………..……............41 2.4.3 Configure the ADT plugin ……………………………......……….……….41 2.4.4 Adding SDK Components …………………………………….…………...41 2.4.5 Create an AVD ……………………………………………….…...……….42 2.4.6 Create a new Android Application …………………………..…….............42 2.5 The cryptographic library in JAVA ……..…………………………...……………....43 2.5.1 Introduction …………………………………….…………..……………...43 2.5.2 2 FlexiProvider …………………………………….…...…..……………...43 3. The application characteristics ……………………………………………...……...................44 3.1 The architecture of the application ………………………………....….…………….44 3.2 The specifications of the application………………………………..………………..45 3.3 Some application screenshots……………………………..………………………….45 4. Implementation and experimental results ……………………………………………………..47 4.1 The selected android mobiles………………………………………………………...48 4.2 Choice of parameters……………………………………………………….………...48 4.3 Calculation of execution time and memory occupation ………………...…………...49 4.4 Experimental results………………………………………………………..………...50 4.4.1 The time of execution………………………………………………………51 4.5 Comparisons and performance tests……………………………………..…………...53 4.5.1 Mobile GT-I9100…………………………………….…………..…………53 4.5.1.1 NTRU vs ECC ……………………………………………..…….53 4.5.1.2 RSA vs ECC ……………………………………………………..53 4.5.1.3 NTRU vs RSA ……………………………….………….……….53 4.5.2 Mobile GT-S6102 ………………………………………………………….54 4.5.2.1 NTRU vs ECC …………………………………………….……..54 4.5.2.2 RSA vs ECC ……………………………………………………..54 4.5.2.3
Recommended publications
  • Final Exam 2005
    COMP-547A page 1 of 4 Faculty of Science Final Examination Computer Science COMP-547A Cryptography and Data Security Examiner: Prof. Claude Crépeau Date: Dec 7th, 2005 Associate Examiner: Prof. David Avis Time: 14:00 – 17:00 Room: PetH 206 INSTRUCTION: • This examination is worth 50% of your final grade. • The total of all questions is 109 points. • Each question is assigned a value found in parenthesis next to it. • This is an open book examination. All documentation is permitted. • Faculty standard calculator permitted only. • This examination consists of 6 questions on 4 pages, including title page. Suggestion: read all the questions and their values before you start. COMP-547A page 2 of 4 Question 1. Easy bits (12 points) Let p be an odd prime and g be a primitive element mod p. x • Show that given p, g, g mod p, the predicate lsbp(x) is easy to compute. • Show that given p, g, ga mod p, gb mod p there is a predicate of gab mod p that is easy to compute. Question 2. Second Preimage (12 points) Question 3. Blum-Goldwasser à la RSA (25 points) Let n=pq be the product of two large primes such that p ≡ q ≡ 2 (mod 3). • Provide all the details of a variant of the Blum-Goldwasser cryptosystem where we use i i RSA with public exponent 3 (z =lsb(s 3 mod n)) instead of BBS (z =lsb(s 2 mod n)) as in i 0 i 0 the original system. Rewrite the entire description of the Blum-Goldwasser cryptosystem as given in cryptosystem 8.2 (see next page).
    [Show full text]
  • Jeffrey Hoffstein Jill Pipher Joseph H. Silverman
    Undergraduate Texts in Mathematics Je rey Ho stein Jill Pipher Joseph H. Silverman An Introduction to Mathematical Cryptography Second Edition Undergraduate Texts in Mathematics Undergraduate Texts in Mathematics Series Editors: Sheldon Axler San Francisco State University, San Francisco, CA, USA Kenneth Ribet University of California, Berkeley, CA, USA Advisory Board: Colin Adams, Williams College, Williamstown, MA, USA Alejandro Adem, University of British Columbia, Vancouver, BC, Canada Ruth Charney, Brandeis University, Waltham, MA, USA Irene M. Gamba, The University of Texas at Austin, Austin, TX, USA Roger E. Howe, Yale University, New Haven, CT, USA David Jerison, Massachusetts Institute of Technology, Cambridge, MA, USA Jeffrey C. Lagarias, University of Michigan, Ann Arbor, MI, USA Jill Pipher, Brown University, Providence, RI, USA Fadil Santosa, University of Minnesota, Minneapolis, MN, USA Amie Wilkinson, University of Chicago, Chicago, IL, USA Undergraduate Texts in Mathematics are generally aimed at third- and fourth- year undergraduate mathematics students at North American universities. These texts strive to provide students and teachers with new perspectives and novel approaches. The books include motivation that guides the reader to an appreciation of interre- lations among different aspects of the subject. They feature examples that illustrate key concepts as well as exercises that strengthen understanding. More information about this series at http://www.springer.com/series/666 Jeffrey Hoffstein • Jill Pipher Joseph
    [Show full text]
  • A Survey on the Provable Security Using Indistinguishability Notion on Cryptographic Encryption Schemes
    A SURVEY ON THE PROVABLE SECURITY USING INDISTINGUISHABILITY NOTION ON CRYPTOGRAPHIC ENCRYPTION SCHEMES A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED MATHEMATICS OF MIDDLE EAST TECHNICAL UNIVERSITY BY EMRE AYAR IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN CRYPTOGRAPHY FEBRUARY 2018 Approval of the thesis: A SURVEY ON THE PROVABLE SECURITY USING INDISTINGUISHABILITY NOTION ON CRYPTOGRAPHIC ENCRYPTION SCHEMES submitted by EMRE AYAR in partial fulfillment of the requirements for the degree of Master of Science in Department of Cryptography, Middle East Technical University by, Prof. Dr. Om¨ ur¨ Ugur˘ Director, Graduate School of Applied Mathematics Prof. Dr. Ferruh Ozbudak¨ Head of Department, Cryptography Assoc. Prof. Dr. Ali Doganaksoy˘ Supervisor, Cryptography, METU Dr. Onur Koc¸ak Co-supervisor, TUB¨ ITAK˙ - UEKAE, Istanbul˙ Examining Committee Members: Assoc. Prof. Dr. Murat Cenk Cryptography, METU Assoc. Prof. Dr. Ali Doganaksoy˘ Department of Mathematics, METU Assist. Prof. Dr. Fatih Sulak Department of Mathematics, Atılım University Date: I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last Name: EMRE AYAR Signature : v vi ABSTRACT A SURVEY ON THE PROVABLE SECURITY USING INDISTINGUISHABILITY NOTION ON CRYPTOGRAPHIC ENCRYPTION SCHEMES Ayar, Emre M.S., Department of Cryptography Supervisor : Assoc. Prof. Dr. Ali Doganaksoy˘ Co-Supervisor : Dr. Onur Koc¸ak February 2018, 44 pages For an encryption scheme, instead of Shannon’s perfect security definition, Goldwasser and Micali defined a realistic provable security called semantic security.
    [Show full text]
  • Implementation and Evaluation of Secure Industrial Ethernet Communication
    Implementation and Evaluation of Secure Industrial Ethernet Communication Master of Science Thesis, Communication Engineering KAN YU Department of Signals and Systems CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden, August 2010 Page 2/88 Abstract Automation network security becomes increasingly important due to the introduction of Ethernet- based fieldbus protocols and cryptographic algorithms play a vital important role in these protocols. Choosing the most suitable cryptographic algorithms under consideration of security and performance according to different application cases is essential. In this thesis, we first present a comprehensive survey of most commonly used cryptographic algorithms which can be applied in automation networks and then identify our candidates based on existing literature and related works for further evaluation in ARM platform for industrial purpose. Finally, according to our evaluation results, we choose suitable algorithms for different applications: for symmetric algorithms, Twofish is recommended for best performance and eXtended Tiny Encryption Algorithm (XTEA) and Corrected Block Tiny Encryption Algorithm (XXTEA) are recommended for the least footprint; for Message Authentication Code (MAC) algorithms, UMAC is strongly recommended for excellent speed; for asymmetric algorithms, Elliptic Curve Cryptography (ECC) has much better performance than RSA at the same security level in our platform. Page 3/88 TABLE OF CONTENTS 1 INTRODUCTION ..................................................................................................................................
    [Show full text]
  • 11 Digital Signatures
    This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the following specific permissions for the electronic version of this book: Permission is granted to retrieve, print and store a single copy of this chapter for personal use. This permission does not extend to binding multiple chapters of the book, photocopying or producing copies for other than personal use of the person creating the copy, or making electronic copies available for retrieval by others without prior permission in writing from CRC Press. Except where over-ridden by the specific permission above, the standard copyright notice from CRC Press applies to this electronic version: Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press for such copying. c 1997 by CRC Press, Inc. Chapter 11 Digital Signatures Contents in Brief 11.1 Introduction :::::::::::::::::::::::::::::425 11.2 A framework for digital signature mechanisms ::::::::::426 11.3 RSA and related signature schemes :::::::::::::::::433 11.4 Fiat-Shamir signature schemes :::::::::::::::::::447 11.5 The DSA and related signature schemes ::::::::::::::451 11.6 One-time digital signatures :::::::::::::::::::::462 11.7 Other signature schemes ::::::::::::::::::::::471 11.8 Signatures with additional functionality ::::::::::::::474 11.9 Notes and further references ::::::::::::::::::::481 11.1 Introduction This chapter considers techniques designed to provide the digital counterpart to a handwrit- ten signature.
    [Show full text]
  • Introduction to Cryptography Lecture 8
    Reminder: RSA Public Key Cryptosystem * * • The multiplicative group ZN =Zpq . The size of the group is φ(n) = φ(pq) = (p-1) (q-1) Introduction to Cryptography • Public key : Lecture 8 – N=pq the product of two primes – e such that gcd (e, φ(N))=1 (are these hard to find?) • Private key: Rabin’s encryption system, – d such that de ≡1 mod φ(N) Digital signatures ∈ • Encryption of M ZN* e – C=E(M)=M mod N Benny Pinkas ∈ • Decryption of C ZN* d – M=D(C)=C mod N (why does it work?) December 18, 2005 Introduction to Cryptography, Benny Pinkas page 1 December 18, 2005 Introduction to Cryptography, Benny Pinkas page 2 Reminders Rabin’s encryption systems • The Chinese Remainder Theorem (CRT): • Key generation: – Let N=pq with gcd( p,q)=1. – Private key: random primes p,q (e.g. 512 bits long). ∈ × – Then for every pair (y,z) Zp Zq there exists a unique – Public key: N=pq . ∈ x Zn, s.t. • x=y mod p • Encryption: • x=z mod q ∈ * – Plaintext m ZN . – Ciphertext: c = m 2 mod N. (very efficient) • Quadratic Residues: ∈ * ∈ * 2 1/2 – The square root of x Zp is y Zp s.t. y =x mod p. • Decryption: Compute c mod N. ∈ * – x Zp has either 2 or 0 square roots, and is denoted as a Quadratic Residue (QR) or Non Quadratic Residue (NQR), respectively. ∈ * (p-1)/2 – Euler’s theorem: x Zp is a QR iff x = 1 mod p. December 18, 2005 Introduction to Cryptography, Benny Pinkas page 3 December 18, 2005 Introduction to Cryptography, Benny Pinkas page 4 1 Square roots modulo N Square roots modulo N • ⇒⇒⇒ Let x be a quadratic residue (QR) modulo N=pq, t hen • N= pq .
    [Show full text]
  • Fault Analysis of the Ntrusign Digital Signature Scheme
    Cryptogr. Commun. (2012) 4:131–144 DOI 10.1007/s12095-011-0061-3 Fault analysis of the NTRUSign digital signature scheme Abdel Alim Kamal · Amr M. Youssef Received: 11 December 2010 / Accepted: 14 December 2011 / Published online: 6 January 2012 © Springer Science+Business Media, LLC 2012 Abstract We present a fault analysis of the NTRUSign digital signature scheme. The utilized fault model is the one in which the attacker is assumed to be able to fault a small number of coefficients in a specific polynomial during the signing process but cannot control the exact location of the injected transient faults. For NTRUsign with parameters (N, q = pl, B, standard, N ), when the attacker is able to skip the norm-bound signature checking step, our attack needs one fault, ≈ − 1 (( )t) succeeds with probability 1 p and requires O qN steps when the number of faulted polynomial coefficients is upper bounded by t. The attack is also applicable to NTRUSign utilizing the transpose NTRU lattice but it requires double the number of fault injections. Different countermeasures against the proposed attack are investigated. Keywords Side channel attacks · Lattice-based public key cryptosystems · Fault analysis and countermeasures · Digital signature schemes · NTRU Mathematics Subject Classification (2010) 94A60 1 Introduction NTRUSign [1–4] is a parameterized family of lattice-based public key digital signa- ture schemes that is currently under consideration for standardization by the IEEE P1363 working group. It was proposed after the original NTRU signature scheme (NSS) [5] was broken [6, 7]. Similar to the GGH cryptosystem [8], the security of A. A.
    [Show full text]
  • Subliminal Channels in High-Speed Signatures
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at institute of telecommunications The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Subliminal Channels in High-Speed Signatures Master’s Thesis for obtaining the academic degree Diplom-Ingenieur as part of the study Electrical Engineering and Information Technology carried out by Alexander Hartl student number: 01125115 Institute of Telecommunications at TU Wien Supervision: Univ. Prof. Dipl.-Ing. Dr.-Ing. Tanja Zseby Dipl.-Ing. Robert Annessi, B.Sc Acknowledgments I want to express my gratitude for everyone who assisted or encouraged me in various ways during my studies. In particular, I would like to thank Prof. Tanja Zseby and Dipl.-Ing. Robert Annessi for giving me the opportunity to write this thesis, for supporting me actively while I was working on it and for many valuable comments and suggestions. I owe special thanks to my family, especially my parents Edith and Rudolf, for their endless support during all these years. Thank you, Sabrina, for encouraging me and for so many cheerful hours in my life. Abstract One of the fundamental building blocks for achieving security in data networks is the use of digital signatures. A digital signature is a bit string which allows the receiver of a message to ensure that the message indeed originated from the apparent sender and has not been altered along the path.
    [Show full text]
  • Rabin Crypto System Overview the Rabin Cryptosystem
    Rabin Crypto System Overview Murat Kantarcioglu The Rabin Cryptosystem • Computationally secure against a chosen plaintext attack – Provided that the modulus n = pq can not be factored. o binXa @ @ • n is the public key. The primes p and q are the private key. • Choose to simplify the computation of square roots modulo p and q 2 The Rabin Cryptosystem • B encrypts a message m and sends the ciphertext c to A • Encryption: – Obtain A’s public key n. – Represent the message as an integer m in the range {0, 1, . ,n-1}. – Compute F bN bin ò – Send the ciphertext c to A 3 The Rabin Cryptosystem • A decrypts the ciphertext c as follows: • Decryption: – Compute Aù bin ò – There are four square roots b Ç I b N I b å I b X of c modulo n. – The message m is equal to one of these four messages 4 The Rabin Cryptosystem • When b i n X there is a simple formula to compute t@he square root of c in mod p. ï ùïiÇaXaN ùïiÇaN bin û % @ ù aN ù bin û @ . ù bin û @ • Here we have made use of Euler’s criterion to claim that ùï ÇaN Ç bin û . @ 5 The Rabin Cryptosystem • Hence the two square roots of c mod p are ùïiÇaX bin û % • In a similar fashion, the two square roots of c mod q are ùïoiÇaÄX bin o % • Then we can obtain the four square roots of c mod n using the Chinese Remainder Theorem 6 The Rabin Cryptosystem • Example: F ùù F ù ÇÇ * – Suppose F bN bin ùù – Then for message m the ciphertext c is computed as Aù bin ùù – And for decryption we need to compute ù ÇEN Nå bin ùù @ @ – Suppose Alice wants to send message m = 10 7 The Rabin Cryptosystem • To find the square roots of 23 in mod 7 and in mod 11 we can use the formula since 7 and 11 are cogruent to 3 mod 4.
    [Show full text]
  • Public-Key Cryptography
    Public-key Cryptogra; Theory and Practice ABHIJIT DAS Department of Computer Science and Engineering Indian Institute of Technology Kharagpur C. E. VENIMADHAVAN Department of Computer Science and Automation Indian Institute ofScience, Bangalore PEARSON Chennai • Delhi • Chandigarh Upper Saddle River • Boston • London Sydney • Singapore • Hong Kong • Toronto • Tokyo Contents Preface xiii Notations xv 1 Overview 1 1.1 Introduction 2 1.2 Common Cryptographic Primitives 2 1.2.1 The Classical Problem: Secure Transmission of Messages 2 Symmetric-key or secret-key cryptography 4 Asymmetric-key or public-key cryptography 4 1.2.2 Key Exchange 5 1.2.3 Digital Signatures 5 1.2.4 Entity Authentication 6 1.2.5 Secret Sharing 8 1.2.6 Hashing 8 1.2.7 Certification 9 1.3 Public-key Cryptography 9 1.3.1 The Mathematical Problems 9 1.3.2 Realization of Key Pairs 10 1.3.3 Public-key Cryptanalysis 11 1.4 Some Cryptographic Terms 11 1.4.1 Models of Attacks 12 1.4.2 Models of Passive Attacks 12 1.4.3 Public Versus Private Algorithms 13 2 Mathematical Concepts 15 2.1 Introduction 16 2.2 Sets, Relations and Functions 16 2.2.1 Set Operations 17 2.2.2 Relations 17 2.2.3 Functions 18 2.2.4 The Axioms of Mathematics 19 Exercise Set 2.2 20 2.3 Groups 21 2.3.1 Definition and Basic Properties . 21 2.3.2 Subgroups, Cosets and Quotient Groups 23 2.3.3 Homomorphisms 25 2.3.4 Generators and Orders 26 2.3.5 Sylow's Theorem 27 Exercise Set 2.3 29 2.4 Rings 31 2.4.1 Definition and Basic Properties 31 2.4.2 Subrings, Ideals and Quotient Rings 34 2.4.3 Homomorphisms 37 2.4.4
    [Show full text]
  • Rabin-$ P $ Cryptosystem: Practical and Efficient Method for Rabin
    Rabin-p Cryptosystem: Practical and Efficient Method for Rabin based Encryption Scheme M.A. Asbullah1 and M.R.K. Ariffin1,2 1 Al-Kindi Cryptography Research Laboratory, Institute for Mathematical Research 2 Department of Mathematics, Faculty of Science, Universiti Putra Malaysia (UPM), Selangor, Malaysia [email protected], [email protected] Abstract. In this work, we introduce a new, efficient and practical scheme based on the Rabin cryptosystem without using the Jacobi sym- bol, message redundancy technique or the needs of extra bits in order to specify the correct plaintext. Our system involves only a single prime number as the decryption key and does only one modular exponentia- tion. Consequently, this will practically reduce the computational efforts during decryption process. We demonstrate that the decryption is unique and proven to be equivalent to factoring.The scheme is performs better when compared to a number of Rabin cryptosystem variants. Keywords: Rabin Cryptosystem, Factoring, Coppersmiths Theorem, Chinese Remainder Theorem. 1 Introduction 1.1 Background Prior to 1970s, encryption and decryption were done only in symmetrical ways. This was the practice until the advent of public key cryptosystem that was introduced by [30]. Yet, at that time the notion of asymmetric cryptosystem is somehow not well realized by many people. In 1978 the RSA cryptosystem arXiv:1411.4398v1 [cs.CR] 17 Nov 2014 [24] went public and it is regarded now by the cryptographic community as the first practical realization of the public key cryptosystem. The security of RSA is based on the intractability to solve the modular e-th root problem coupled with the integer factorization problem (IFP) of the form N = pq.
    [Show full text]
  • Efficient Implementations of Attribute-Based Credentials on Smart Cards
    Efficient Implementations of Attribute-based Credentials on Smart Cards Pim Vullers Copyright c 2014 Pim Vullers IPA Dissertation Series: 2014-15 ISBN: 978-94-6259-376-3 NUR: 980 Typeset using LATEX 2ε (TEXLive 2013) Cover design by Koen Vullers Printed by Ipskamp Drukkers (http://proefschriften.net/) The work in this thesis has been carried out under the auspices of the research school IPA (Institute for Programming research and Algorithmics). The author was employed at the Radboud University Nijmegen. This research was sponsored by Trans Link Systems / Open Ticketing. This work is licensed under the Creative Commons Attribution-ShareAlike 4.0 International license. To view a copy of this license, please visit http://creativecommons.org/licenses/by-sa/4.0/. Efficient Implementations of Attribute-based Credentials on Smart Cards Proefschrift ter verkrijging van de graad van doctor aan de Radboud Universiteit Nijmegen op gezag van de rector magnificus prof. dr. Th.L.M. Engelen, volgens besluit van het college van decanen in het openbaar te verdedigen op vrijdag 28 november 2014 om 10.30 uur precies. door Pim Vullers geboren op 20 juni 1986 te Venlo Promotor: Prof. dr. B.P.F. Jacobs Manuscriptcommissie: Prof. dr. E.R. Verheul Prof. dr. S. Mauw Université du Luxembourg, Luxemburg Prof. dr. ir. B. de Decker KU Leuven, België Dr. G. Neven IBM Research Zürich, Zwitserland Dr. ir. E. Poll Samenvatting We leven in een wereld waarin computers een steeds grotere rol spelen. Daarom wordt het alsmaar belangrijker om gebruikers en objecten digitaal te kunnen iden- tificeren. Om dit te bereiken gebruiken veel bestaande systemen unieke nummers, denk bijvoorbeeld aan je burgerservicenummer (BSN).
    [Show full text]