共查询到20条相似文献,搜索用时 15 毫秒
1.
Recently, Smith and Lennon (1993) proposed a new public key system LUC in which the trapdoor is based on the defined Lucas function instead of exponentiation. The authors present some remarkable properties of the Lucas function, which may or may not be disadvantages of the LUC system.<> 相似文献
2.
新公钥系统是利用Dickson的另外两类多项式,替代生成LUC系统的Lucas序列,利用一个新的算法构造的公钥系统。与LUC系统相比,新公钥系统具有相同的安全性,但是计算量减少,效率相对提高,比LUC系统实用性更强。 相似文献
3.
网络认证技术是“互联网+”行动计划应用推广的关键安全保障,基于公钥密码体制的数字签名已经成为身份与信息认证的主要手段,而数字签名有赖于认证中心(CA)及其基础设施(PKI).目前,认证中心依然存在身份认证不能互信互认、投入高、安全控制及运维难度大等问题.提出一种在不降低安全程度的情况下,缩短公钥密码长度,实现公钥可视化的技术,这种技术可以不再完全依赖第三方的认证机构,是去除认证中心当前存在问题的一种有效途径. 相似文献
4.
5.
The letter presents an observation of theoretical interest regarding exponentiation in a finite field. The result can be applied towards reducing the time required for the first of two exponentiations specified by the Mitre public key cryptographic system. 相似文献
6.
The Kravitz-Reed public key encryption system, a variant of the MIT system based on Galois fields, is interesting because it offers the potential of high security with efficient implementation. In the letter we demonstrate that high security and efficient implementation are not, in reality, compatible goals with this algorithm. Efficient implementation is subject to a short cycling attack that exposes the secret key to computation. If the parameters of the algorithm are selected for high security, then the algorithm cannot be efficiently implemented. 相似文献
7.
The introduction of a plethora of key recovery (KR) schemes and the lack of a standard has led to interoperability problems between dissimilar mechanisms. To overcome these problems the key recovery alliance (KRA) has proposed a common key recovery block (KRB) format. The authors identify some cases in which the mechanism fails to achieve its objectives 相似文献
8.
Since the time of Caesar, cryptography has been used in the design of secure communications systems. Recently, Diffie and Hellman [2] have introduced a new type of cryptographic method, based on "trapdoor" functions, which promises to be of great value in the design of such systems. We present a review of public key cryptosystems, followed by examples of communications systems which make particularly elegant use of their properties. 相似文献
9.
为设计后量子公钥密码,赵永哲等人提出了一种基于BMQ问题新的公钥方案。利用有限域上遍历矩阵的性质,从该方案公钥能够直接求出其等价私钥,从而破解了该HFEM公钥密码方案。 相似文献
10.
11.
The Chor-Rivest public key cryptosystem (PKC) is a knapsack-type crypto-system based on arithmetic in finite fields GF (p/sup h/). It uses large fields, such as GF (197/sup 24/), where it is possible to compute discrete logarithms, which must be carried out at system configuration. The author presents a 'specialised attack' on the Chor-Rivest PKC which exploits an inherent algebraic property of the system.<> 相似文献
12.
Security of the Cao-Li public key cryptosystem 总被引:1,自引:0,他引:1
Lim Lek Heng 《Electronics letters》1998,34(2):170-172
The author shows that the Cao-Li cryptosystem proposed [1991] is not secure. Its private key can be reconstructed from its public key using elementary means such as LU-decomposition and the Euclidean algorithm 相似文献
13.
对REESSE1公钥算法的攻击 总被引:1,自引:0,他引:1
最近国内的学者提出了一个名叫REESSEI的公钥算法,其中包括公钥加解密算法和数字签名算法。本文对公钥加解密算法进行了一系列的分析:密钥长度,密钥长度的下界,加解密的算法复杂度。同时指出了该公钥算法所用密钥长度过长,所以并不实用。而当密钥长度取最小时,我们又找到了一种攻击方法,从已知的公钥中完全恢复了私钥。 相似文献
14.
Password-only authenticated key establishment protocol without public key cryptography 总被引:2,自引:0,他引:2
A scenario in which a user and a server can authenticate each other and generate a strong session key through a symmetric cipher by their shared weak (low-entropy) password in an insecure channel is considered. Until now, designing a secure protocol in this scenario has been an open problem due to the offline dictionary attack. A protocol to resolve this problem is proposed. The idea is to ensure that people must participate to verify each guessed password in the offline dictionary attack. Therefore, this attack cannot succeed in a reasonable time for the proposed protocol. 相似文献
15.
A novel method employing the Routh stability array is presented for obtaining a stable approximant for a stable system. 相似文献
16.
A public key cryptosystem is proposed, which is based on the assumption that finding the square root of an element in a large finite ring is computationally infeasible in the absence of a knowledge of the ring structure. The encryption and decryption operations are very fast, and the data expansion is 1:2. 相似文献
17.
利用双线性配对技术提出一个新的基于身份的广播加密方案。在标准模型下,证明了该方案具有适应性攻击安全模型下选择明文安全性。方案中的公钥参数和用户私钥均为固定长度,密文长度较短,并且,新方案还满足完全抗同谋攻击。与现有的广播加密方案相比,新方案更适用于存储量小的系统。 相似文献
18.
Demonstrates an adaptive chosen ciphertext attack against the variation of Cramer-Shoup's public-key encryption scheme as proposed in the original paper [see ibid., vol. 35, no. 14, p. 1150, 1999] 相似文献
19.
Methods of implementing public key algorithms based on modular integer arithmetic (RSA) and finite-field arithmetic (Diffie-Hellman, El Gamal) are examined. Architectures for VLSI implementations are emphasized.<> 相似文献
20.
Huafei Zhu Lee Chan Xiaotie Deng 《Electronics letters》1999,35(14):1150
A variation of the Cramer-Shoup public key scheme is presented. It is shown that the new public key scheme is also secure against adaptive chosen cipher-text attack. In addition the new scheme is simpler and requires less computation than the original scheme 相似文献