The Rabin Cryptosystem Revisited
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Final Exam 2005
COMP-547A page 1 of 4 Faculty of Science Final Examination Computer Science COMP-547A Cryptography and Data Security Examiner: Prof. Claude Crépeau Date: Dec 7th, 2005 Associate Examiner: Prof. David Avis Time: 14:00 – 17:00 Room: PetH 206 INSTRUCTION: • This examination is worth 50% of your final grade. • The total of all questions is 109 points. • Each question is assigned a value found in parenthesis next to it. • This is an open book examination. All documentation is permitted. • Faculty standard calculator permitted only. • This examination consists of 6 questions on 4 pages, including title page. Suggestion: read all the questions and their values before you start. COMP-547A page 2 of 4 Question 1. Easy bits (12 points) Let p be an odd prime and g be a primitive element mod p. x • Show that given p, g, g mod p, the predicate lsbp(x) is easy to compute. • Show that given p, g, ga mod p, gb mod p there is a predicate of gab mod p that is easy to compute. Question 2. Second Preimage (12 points) Question 3. Blum-Goldwasser à la RSA (25 points) Let n=pq be the product of two large primes such that p ≡ q ≡ 2 (mod 3). • Provide all the details of a variant of the Blum-Goldwasser cryptosystem where we use i i RSA with public exponent 3 (z =lsb(s 3 mod n)) instead of BBS (z =lsb(s 2 mod n)) as in i 0 i 0 the original system. Rewrite the entire description of the Blum-Goldwasser cryptosystem as given in cryptosystem 8.2 (see next page). -
A Survey on the Provable Security Using Indistinguishability Notion on Cryptographic Encryption Schemes
A SURVEY ON THE PROVABLE SECURITY USING INDISTINGUISHABILITY NOTION ON CRYPTOGRAPHIC ENCRYPTION SCHEMES A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF APPLIED MATHEMATICS OF MIDDLE EAST TECHNICAL UNIVERSITY BY EMRE AYAR IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN CRYPTOGRAPHY FEBRUARY 2018 Approval of the thesis: A SURVEY ON THE PROVABLE SECURITY USING INDISTINGUISHABILITY NOTION ON CRYPTOGRAPHIC ENCRYPTION SCHEMES submitted by EMRE AYAR in partial fulfillment of the requirements for the degree of Master of Science in Department of Cryptography, Middle East Technical University by, Prof. Dr. Om¨ ur¨ Ugur˘ Director, Graduate School of Applied Mathematics Prof. Dr. Ferruh Ozbudak¨ Head of Department, Cryptography Assoc. Prof. Dr. Ali Doganaksoy˘ Supervisor, Cryptography, METU Dr. Onur Koc¸ak Co-supervisor, TUB¨ ITAK˙ - UEKAE, Istanbul˙ Examining Committee Members: Assoc. Prof. Dr. Murat Cenk Cryptography, METU Assoc. Prof. Dr. Ali Doganaksoy˘ Department of Mathematics, METU Assist. Prof. Dr. Fatih Sulak Department of Mathematics, Atılım University Date: I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare that, as required by these rules and conduct, I have fully cited and referenced all material and results that are not original to this work. Name, Last Name: EMRE AYAR Signature : v vi ABSTRACT A SURVEY ON THE PROVABLE SECURITY USING INDISTINGUISHABILITY NOTION ON CRYPTOGRAPHIC ENCRYPTION SCHEMES Ayar, Emre M.S., Department of Cryptography Supervisor : Assoc. Prof. Dr. Ali Doganaksoy˘ Co-Supervisor : Dr. Onur Koc¸ak February 2018, 44 pages For an encryption scheme, instead of Shannon’s perfect security definition, Goldwasser and Micali defined a realistic provable security called semantic security. -
Implementation and Evaluation of Secure Industrial Ethernet Communication
Implementation and Evaluation of Secure Industrial Ethernet Communication Master of Science Thesis, Communication Engineering KAN YU Department of Signals and Systems CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden, August 2010 Page 2/88 Abstract Automation network security becomes increasingly important due to the introduction of Ethernet- based fieldbus protocols and cryptographic algorithms play a vital important role in these protocols. Choosing the most suitable cryptographic algorithms under consideration of security and performance according to different application cases is essential. In this thesis, we first present a comprehensive survey of most commonly used cryptographic algorithms which can be applied in automation networks and then identify our candidates based on existing literature and related works for further evaluation in ARM platform for industrial purpose. Finally, according to our evaluation results, we choose suitable algorithms for different applications: for symmetric algorithms, Twofish is recommended for best performance and eXtended Tiny Encryption Algorithm (XTEA) and Corrected Block Tiny Encryption Algorithm (XXTEA) are recommended for the least footprint; for Message Authentication Code (MAC) algorithms, UMAC is strongly recommended for excellent speed; for asymmetric algorithms, Elliptic Curve Cryptography (ECC) has much better performance than RSA at the same security level in our platform. Page 3/88 TABLE OF CONTENTS 1 INTRODUCTION .................................................................................................................................. -
Parity Alternating Permutations Starting with an Odd Integer
Parity alternating permutations starting with an odd integer Frether Getachew Kebede1a, Fanja Rakotondrajaob aDepartment of Mathematics, College of Natural and Computational Sciences, Addis Ababa University, P.O.Box 1176, Addis Ababa, Ethiopia; e-mail: [email protected] bD´epartement de Math´ematiques et Informatique, BP 907 Universit´ed’Antananarivo, 101 Antananarivo, Madagascar; e-mail: [email protected] Abstract A Parity Alternating Permutation of the set [n] = 1, 2,...,n is a permutation with { } even and odd entries alternatively. We deal with parity alternating permutations having an odd entry in the first position, PAPs. We study the numbers that count the PAPs with even as well as odd parity. We also study a subclass of PAPs being derangements as well, Parity Alternating Derangements (PADs). Moreover, by considering the parity of these PADs we look into their statistical property of excedance. Keywords: parity, parity alternating permutation, parity alternating derangement, excedance 2020 MSC: 05A05, 05A15, 05A19 arXiv:2101.09125v1 [math.CO] 22 Jan 2021 1. Introduction and preliminaries A permutation π is a bijection from the set [n]= 1, 2,...,n to itself and we will write it { } in standard representation as π = π(1) π(2) π(n), or as the product of disjoint cycles. ··· The parity of a permutation π is defined as the parity of the number of transpositions (cycles of length two) in any representation of π as a product of transpositions. One 1Corresponding author. n c way of determining the parity of π is by obtaining the sign of ( 1) − , where c is the − number of cycles in the cycle representation of π. -
Introduction to Cryptography Lecture 8
Reminder: RSA Public Key Cryptosystem * * • The multiplicative group ZN =Zpq . The size of the group is φ(n) = φ(pq) = (p-1) (q-1) Introduction to Cryptography • Public key : Lecture 8 – N=pq the product of two primes – e such that gcd (e, φ(N))=1 (are these hard to find?) • Private key: Rabin’s encryption system, – d such that de ≡1 mod φ(N) Digital signatures ∈ • Encryption of M ZN* e – C=E(M)=M mod N Benny Pinkas ∈ • Decryption of C ZN* d – M=D(C)=C mod N (why does it work?) December 18, 2005 Introduction to Cryptography, Benny Pinkas page 1 December 18, 2005 Introduction to Cryptography, Benny Pinkas page 2 Reminders Rabin’s encryption systems • The Chinese Remainder Theorem (CRT): • Key generation: – Let N=pq with gcd( p,q)=1. – Private key: random primes p,q (e.g. 512 bits long). ∈ × – Then for every pair (y,z) Zp Zq there exists a unique – Public key: N=pq . ∈ x Zn, s.t. • x=y mod p • Encryption: • x=z mod q ∈ * – Plaintext m ZN . – Ciphertext: c = m 2 mod N. (very efficient) • Quadratic Residues: ∈ * ∈ * 2 1/2 – The square root of x Zp is y Zp s.t. y =x mod p. • Decryption: Compute c mod N. ∈ * – x Zp has either 2 or 0 square roots, and is denoted as a Quadratic Residue (QR) or Non Quadratic Residue (NQR), respectively. ∈ * (p-1)/2 – Euler’s theorem: x Zp is a QR iff x = 1 mod p. December 18, 2005 Introduction to Cryptography, Benny Pinkas page 3 December 18, 2005 Introduction to Cryptography, Benny Pinkas page 4 1 Square roots modulo N Square roots modulo N • ⇒⇒⇒ Let x be a quadratic residue (QR) modulo N=pq, t hen • N= pq . -
On the Parity of the Number of Multiplicative Partitions and Related Problems
PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 140, Number 11, November 2012, Pages 3793–3803 S 0002-9939(2012)11254-7 Article electronically published on March 15, 2012 ON THE PARITY OF THE NUMBER OF MULTIPLICATIVE PARTITIONS AND RELATED PROBLEMS PAUL POLLACK (Communicated by Ken Ono) Abstract. Let f(N) be the number of unordered factorizations of N,where a factorization is a way of writing N as a product of integers all larger than 1. For example, the factorizations of 30 are 2 · 3 · 5, 5 · 6, 3 · 10, 2 · 15, 30, so that f(30) = 5. The function f(N), as a multiplicative analogue of the (additive) partition function p(N), was first proposed by MacMahon, and its study was pursued by Oppenheim, Szekeres and Tur´an, and others. Recently, Zaharescu and Zaki showed that f(N) is even a positive propor- tion of the time and odd a positive proportion of the time. Here we show that for any arithmetic progression a mod m,thesetofN for which f(N) ≡ a(mod m) possesses an asymptotic density. Moreover, the density is positive as long as there is at least one such N. For the case investigated by Zaharescu and Zaki, we show that f is odd more than 50 percent of the time (in fact, about 57 percent). 1. Introduction Let f(N) be the number of unordered factorizations of N,whereafactorization of N is a way of writing N as a product of integers larger than 1. For example, f(12) = 4, corresponding to 2 · 6, 2 · 2 · 3, 3 · 4, 12. -
Rabin Crypto System Overview the Rabin Cryptosystem
Rabin Crypto System Overview Murat Kantarcioglu The Rabin Cryptosystem • Computationally secure against a chosen plaintext attack – Provided that the modulus n = pq can not be factored. o binXa @ @ • n is the public key. The primes p and q are the private key. • Choose to simplify the computation of square roots modulo p and q 2 The Rabin Cryptosystem • B encrypts a message m and sends the ciphertext c to A • Encryption: – Obtain A’s public key n. – Represent the message as an integer m in the range {0, 1, . ,n-1}. – Compute F bN bin ò – Send the ciphertext c to A 3 The Rabin Cryptosystem • A decrypts the ciphertext c as follows: • Decryption: – Compute Aù bin ò – There are four square roots b Ç I b N I b å I b X of c modulo n. – The message m is equal to one of these four messages 4 The Rabin Cryptosystem • When b i n X there is a simple formula to compute t@he square root of c in mod p. ï ùïiÇaXaN ùïiÇaN bin û % @ ù aN ù bin û @ . ù bin û @ • Here we have made use of Euler’s criterion to claim that ùï ÇaN Ç bin û . @ 5 The Rabin Cryptosystem • Hence the two square roots of c mod p are ùïiÇaX bin û % • In a similar fashion, the two square roots of c mod q are ùïoiÇaÄX bin o % • Then we can obtain the four square roots of c mod n using the Chinese Remainder Theorem 6 The Rabin Cryptosystem • Example: F ùù F ù ÇÇ * – Suppose F bN bin ùù – Then for message m the ciphertext c is computed as Aù bin ùù – And for decryption we need to compute ù ÇEN Nå bin ùù @ @ – Suppose Alice wants to send message m = 10 7 The Rabin Cryptosystem • To find the square roots of 23 in mod 7 and in mod 11 we can use the formula since 7 and 11 are cogruent to 3 mod 4. -
The ℓ-Parity Conjecture Over the Constant Quadratic Extension
THE `-PARITY CONJECTURE OVER THE CONSTANT QUADRATIC EXTENSION KĘSTUTIS ČESNAVIČIUS Abstract. For a prime ` and an abelian variety A over a global field K, the `-parity conjecture predicts that, in accordance with the ideas of Birch and Swinnerton-Dyer, the Z`-corank of the `8-Selmer group and the analytic rank agree modulo 2. Assuming that char K ¡ 0, we prove that the `-parity conjecture holds for the base change of A to the constant quadratic extension if ` is odd, coprime to char K, and does not divide the degree of every polarization of A. The techniques involved in the proof include the étale cohomological interpretation of Selmer groups, the Grothendieck–Ogg–Shafarevich formula, and the study of the behavior of local root numbers in unramified extensions. 1. Introduction 1.1. The `-parity conjecture. The Birch and Swinnerton-Dyer conjecture (BSD) predicts that the completed L-function LpA; sq of an abelian variety A over a global field K extends meromorphically to the whole complex plane, vanishes to the order rk A at s “ 1, and satisfies the functional equation LpA; 2 ´ sq “ wpAqLpA; sq; (1.1.1) where rk A and wpAq are the Mordell–Weil rank and the global root number of A. The vanishing assertion combines with (1.1.1) to give “BSD modulo 2,” namely, the parity conjecture: ? p´1qrk A “ wpAq: Selmer groups tend to be easier to study than Mordell–Weil groups, so, fixing a prime `, one sets 8 rk` A :“ dimQ` HompSel` A; Q`{Z`q bZ` Q`; where Sel 8 A : lim Sel n A ` “ ÝÑ ` is the `8-Selmer group, notes that the conjectured finiteness of the Shafarevich–Tate group XpAq implies rk` A “ rk A, and instead of the parity conjecture considers the `-parity conjecture: ? p´1qrk` A “ wpAq: (1.1.2) 1.2. -
Rabin-$ P $ Cryptosystem: Practical and Efficient Method for Rabin
Rabin-p Cryptosystem: Practical and Efficient Method for Rabin based Encryption Scheme M.A. Asbullah1 and M.R.K. Ariffin1,2 1 Al-Kindi Cryptography Research Laboratory, Institute for Mathematical Research 2 Department of Mathematics, Faculty of Science, Universiti Putra Malaysia (UPM), Selangor, Malaysia [email protected], [email protected] Abstract. In this work, we introduce a new, efficient and practical scheme based on the Rabin cryptosystem without using the Jacobi sym- bol, message redundancy technique or the needs of extra bits in order to specify the correct plaintext. Our system involves only a single prime number as the decryption key and does only one modular exponentia- tion. Consequently, this will practically reduce the computational efforts during decryption process. We demonstrate that the decryption is unique and proven to be equivalent to factoring.The scheme is performs better when compared to a number of Rabin cryptosystem variants. Keywords: Rabin Cryptosystem, Factoring, Coppersmiths Theorem, Chinese Remainder Theorem. 1 Introduction 1.1 Background Prior to 1970s, encryption and decryption were done only in symmetrical ways. This was the practice until the advent of public key cryptosystem that was introduced by [30]. Yet, at that time the notion of asymmetric cryptosystem is somehow not well realized by many people. In 1978 the RSA cryptosystem arXiv:1411.4398v1 [cs.CR] 17 Nov 2014 [24] went public and it is regarded now by the cryptographic community as the first practical realization of the public key cryptosystem. The security of RSA is based on the intractability to solve the modular e-th root problem coupled with the integer factorization problem (IFP) of the form N = pq. -
Some Problems of Erdős on the Sum-Of-Divisors Function
TRANSACTIONS OF THE AMERICAN MATHEMATICAL SOCIETY, SERIES B Volume 3, Pages 1–26 (April 5, 2016) http://dx.doi.org/10.1090/btran/10 SOME PROBLEMS OF ERDOS˝ ON THE SUM-OF-DIVISORS FUNCTION PAUL POLLACK AND CARL POMERANCE For Richard Guy on his 99th birthday. May his sequence be unbounded. Abstract. Let σ(n) denote the sum of all of the positive divisors of n,and let s(n)=σ(n) − n denote the sum of the proper divisors of n. The functions σ(·)ands(·) were favorite subjects of investigation by the late Paul Erd˝os. Here we revisit three themes from Erd˝os’s work on these functions. First, we improve the upper and lower bounds for the counting function of numbers n with n deficient but s(n) abundant, or vice versa. Second, we describe a heuristic argument suggesting the precise asymptotic density of n not in the range of the function s(·); these are the so-called nonaliquot numbers. Finally, we prove new results on the distribution of friendly k-sets, where a friendly σ(n) k-set is a collection of k distinct integers which share the same value of n . 1. Introduction Let σ(n) be the sum of the natural number divisors of n,sothatσ(n)= d|n d. Let s(n) be the sum of only the proper divisors of n,sothats(n)=σ(n) − n. Interest in these functions dates back to the ancient Greeks, who classified numbers as deficient, perfect,orabundant according to whether s(n) <n, s(n)=n,or s(n) >n, respectively. -
Gender Equality: Glossary of Terms and Concepts
GENDER EQUALITY: GLOSSARY OF TERMS AND CONCEPTS GENDER EQUALITY Glossary of Terms and Concepts UNICEF Regional Office for South Asia November 2017 Rui Nomoto GENDER EQUALITY: GLOSSARY OF TERMS AND CONCEPTS GLOSSARY freedoms in the political, economic, social, a cultural, civil or any other field” [United Nations, 1979. ‘Convention on the Elimination of all forms of Discrimination Against Women,’ Article 1]. AA-HA! Accelerated Action for the Health of Adolescents Discrimination can stem from both law (de jure) or A global partnership, led by WHO and of which from practice (de facto). The CEDAW Convention UNICEF is a partner, that offers guidance in the recognizes and addresses both forms of country context on adolescent health and discrimination, whether contained in laws, development and puts a spotlight on adolescent policies, procedures or practice. health in regional and global health agendas. • de jure discrimination Adolescence e.g., in some countries, a woman is not The second decade of life, from the ages of 10- allowed to leave the country or hold a job 19. Young adolescence is the age of 10-14 and without the consent of her husband. late adolescence age 15-19. This period between childhood and adulthood is a pivotal opportunity to • de facto discrimination consolidate any loss/gain made in early e.g., a man and woman may hold the childhood. All too often adolescents - especially same job position and perform the same girls - are endangered by violence, limited by a duties, but their benefits may differ. lack of quality education and unable to access critical health services.i UNICEF focuses on helping adolescents navigate risks and vulnerabilities and take advantage of e opportunities. -
Introduction to Groups, Rings and Fields
Introduction to Groups, Rings and Fields HT and TT 2011 H. A. Priestley 0. Familiar algebraic systems: review and a look ahead. GRF is an ALGEBRA course, and specifically a course about algebraic structures. This introduc- tory section revisits ideas met in the early part of Analysis I and in Linear Algebra I, to set the scene and provide motivation. 0.1 Familiar number systems Consider the traditional number systems N = 0, 1, 2,... the natural numbers { } Z = m n m, n N the integers { − | ∈ } Q = m/n m, n Z, n = 0 the rational numbers { | ∈ } R the real numbers C the complex numbers for which we have N Z Q R C. ⊂ ⊂ ⊂ ⊂ These come equipped with the familiar arithmetic operations of sum and product. The real numbers: Analysis I built on the real numbers. Right at the start of that course you were given a set of assumptions about R, falling under three headings: (1) Algebraic properties (laws of arithmetic), (2) order properties, (3) Completeness Axiom; summarised as saying the real numbers form a complete ordered field. (1) The algebraic properties of R You were told in Analysis I: Addition: for each pair of real numbers a and b there exists a unique real number a + b such that + is a commutative and associative operation; • there exists in R a zero, 0, for addition: a +0=0+ a = a for all a R; • ∈ for each a R there exists an additive inverse a R such that a+( a)=( a)+a = 0. • ∈ − ∈ − − Multiplication: for each pair of real numbers a and b there exists a unique real number a b such that · is a commutative and associative operation; • · there exists in R an identity, 1, for multiplication: a 1 = 1 a = a for all a R; • · · ∈ for each a R with a = 0 there exists an additive inverse a−1 R such that a a−1 = • a−1 a = 1.∈ ∈ · · Addition and multiplication together: forall a,b,c R, we have the distributive law a (b + c)= a b + a c.