Weak Composite Diffie-Hellman

Weak Composite Diffie-Hellman

International Journal of Network Security, Vol.7, No.3, PP.383–387, Nov. 2008 383 Weak Composite Diffie-Hellman∗ Kooshiar Azimian1, Javad Mohajeri2, and Mahmoud Salmasizadeh3 (Corresponding author: Kooshiar Azimian) Electronic Research Centre, Sharif University of Technology1,2,3 Department of Computer Engineering, Sharif University of Technology1 P. O. Box 11155-8639, Azadi Avenue, 14588 Tehran, Iran (Email: [email protected], {mohajeri, salmasi}@sharif.edu) (Received Dec. 24, 2005; revised and accepted Feb. 20, 2006) Abstract intractability of factoring [8]. After that in 1999 Eli Bi- ham, Dan Boneh and Omer Reingold proved that break- In1985, Shmuley proposed a theorem about intractability ing Generalize Diffie-Hellman is also at least as hard as of Composite Diffie-Hellman. The theorem of Shmuley factoring [2]. As will be discussed in more detail in Sec- may be paraphrased as saying that if there exist a prob- tion 3, both Shmuley and also Biham, Boneh and Rein- abilistic polynomial time oracle machine which solves the gold only proved that breaking Composite Diffie-Hellman Diffie-Hellman modulo an RSA-number with odd-order with odd-order base is implied by factoring not breaking bases then there exist a probabilistic algorithm which fac- Composite Diffie-Hellman in general case. tors the modulo. In the other hand Shmuely proved the Paper plan: In Section 2 we list definitions representing theorem only for odd-order bases and left the even-order the various types of problems we deal with in this paper. case as an open problem. In this paper we show that In Section 3 we consider the theorem of Shmuley and that the theorem is also true for even-order bases. Precisely of Biham, Boneh and Reingold. After that, we propose speaking we prove that even if there exist a probabilis- our main theorem and prove it comes true modulo special tic polynomial time oracle machine which can solve the RSA-numbers in Section 4. In Section 5, we will prove problem only for even-order bases still a probabilistic al- that special RSA-numbers introduced in Section 4 have a gorithm can be constructed which factors the modulo in density more than 98%. polynomial time for more than 98% of RSA-numbers. Keywords: Computational number theory, cryptography foundation, Diffie-Hellman problem, factoring, public key 2 Preliminary Definitions cryptography In this section we state definitions used in other sections. In the remainder of this paper, we use the following no- 1 Introduction tations: • p|0x denotes x is not divisible by p. The first public key cryptosystem was proposed by Diffie and Hellman in 1976 [9]. After that, plenty of public- • pkx denotes x is divisible by p but not by p2. key cryptosystems have been proposed. The mostly used public-key encryption scheme throughout the world is • gcd(x, y) denotes the greatest common divisor of x RSA that invented by Ronald Rivest, Adi Shamir and and y. Leonard Adleman in 1977. After that, many cryptogra- phers tried to combine these two cryptosystems to obtain • lcm[x, y] denotes the least common multiple of x and more security. y. The main idea of Composite Diffie-Hellman was first • ord (x) denotes the smallest positive integer d such proposed by Shmuley and McCurley [8, 10]. Shmuley N that xd = 1(modN). proved that breaking Composite Diffie-Hellman with odd- order base is at least as hard as factoring. In 1988, K. • λ denotes the Carmichael Function (also called the S. McCurley proposed a new cryptosystem based on the least universal exponent function) [4]. For any inte- idea of Shmuley and proved it is provably secure based on ger N, λ(N) is defined as the smallest integer such λ(N) ∗ that x ≡ 1(modN) for all x relatively prime to The first version in the Electronic Colloquium on Computa- tional Complexity (ECCC) (047): (2005), and the second version in N. Note that according to [5], Section 4 for any ePrint Archive (eprint.iacr.org) Report 2005/111, April 2005 RSA-number N = pq, λ(N) ≡ lcm[p − 1, q − 1]. International Journal of Network Security, Vol.7, No.3, PP.383–387, Nov. 2008 384 • log(x) denotes the logarithm function with base 2. Definition 7. (ε-factoring) Let A be a probabilistic Turing-machine and ε = ε(n) a real-valued function. A • φ denotes the Euler-totient function. ε-solves the Factoring-Problem if for infinitely n’s Definition 1. (FIG) The Factoring-instance-generator, P r[A(P · Q) ∈{P,Q}≥ ε(n) FIG is a probabilistic polynomial time algorithm such that n on input 1 its output, N = P · Q is distributed over where the distribution of N = P · Q is F IG(1n). 2n − bit integers, where P and Qq are two n-bit primes (Such N is known as a RSA-number). A natural way to define FIG is to let F IG(1n) be uni- 3 Previous Works formly distributed over 2n − bit RSA-numbers. In 1985, Shmuley proved that the following theorem [10]: Definition 2. (The function DH) Let N be any possible n ∗ Theorem 1. Shmuley’s Theorem: If there exist a output of F IG(1 ), let g be any element in ZN . Define x y the function DHN,g(g ,g ) with domain D = (g) × (g) probabilistic polynomial time oracle machine which ε- such that, solves the Hard DH-Problem modulo an RSA-number N. Then we can construct a probabilistic algorithm which can x y xy DHN,g(g ,g )= g mod N. ε-factor the module in polynomial time. x y In 1988, K. S. McCurley proposed a new key distribu- g is called the base of the function DHN,g, and g , g are called two inputs of the function. tion system based on the concept of Diffie-Hellman mod- ulo a composite and proved that breaking that scheme Definition 3. (ε-solving the DH-Problem) Let A be a is at least as hard as factoring [8, 10]. In 1999 Eli Bi- probabilistic oracle machine and ε = ε(n) a real-valued ham, Dan Bone and Omer Reingold proposed a theorem function.A ε-solves the DH-Problem if for infinitely n’s like that of Shmuley for Generalize Diffie-Hellman (Diffie- Hellman for more than two parties). DH n P r(A N,g (N,g)= DH(1 )) ≥ ε(n). The Shmuley’s theorem is restricted in the case where ∗ base g is an odd-order element in ZN . The theorem of Definition 4. (ε-solving the Hard DH-Problem) Let A be Biham, Boneh and Reingold is also restricted in the case a probabilistic oracle machine and ε = ε(n) a real-valued that N is a Blum-integer and g is a quadratic-residue. It function. A ε-solves the Hard DH-Problem if it ε-solves is clear that g will be an odd-order element in those cir- the DH-Problem for odd-order bases (ordN (g) is an odd cumstances. It is clear that theorem of Biham, Boneh and number). Reingold for two parties is a special case of that of Shmu- ley. Consequently, so far, there is no theorem concerning Definition 5. (ε-solving the Weak DH-Problem) Let A be intractability of breaking Composite Diffie-Hellman in the a probabilistic oracle machine and ε = ε(n) a real-valued case which g is an even-order element. In the other hand, function. A ε-solves the Weak DH-Problem if it ε-solves there is no fact about intractability of Weak DH-Problem. the DH-Problem for even-order bases (ordN (g) is an even number). Although the names selected for these two problems - 4 The Reduction Hard-DH problem and Weak-DH problem- do not make In this section, we state our main theorem. First we pro- any difference in what we are looking for, here we show pose some elementary lemma used in our proof, and then intuitively that the hard-DH problem appear to be harder we propose our main theorem. than Weak-DH problem. Definition 8. A 2n-bit RSA-number, N = PQ is said Definition 6. Let N be any possible output of F IG(1n). to be a good RSA-number if p k λ(N), for some prime Let g and g0 be two integers such that ord (g) is an odd N p < log(N). 0 2k number, ordN (g ) is an even number and g = g mod N. x y If g ,g are two possible inputs for DHN,g, then we have Lemma 1. If N is a good RSA-number, p is a prime the followings: (all equations are modulo N) such that p k λ(N) and x = yp(modN) for some integer y then ord(x) is not divisible by p. x y 02k 02ky 02kxy DHN,g0 (g ,g ) = DHN,g0 (g ,g )= g Lemma 2. Let N = PQ be a good RSA-number, s be a 2kxy x y 2k = g = (DHN,g(g ,g )) . prime such that p k λ(N) and x and y be two integers cho- sen randomly from Z∗ , such that xs = ys(modN) then x y N Therefore DHN,g0 (g ,g ) can be obtained if we can com- gcd(x − y,N) yields a non-trivial factor of N with proba- x y pute DHN,g(g ,g ). We should remember that we don’t bility 1 − (1/s). want to prove that hard DH-problem is not weaker than weak DH-problem. We only want to show that why we The generalized form of this lemma was proposed in select these names.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us