共查询到20条相似文献,搜索用时 78 毫秒
1.
Linearly shift knapsack public-key cryptosystem 总被引:10,自引:0,他引:10
Laih C.-S. Lee J.-Y. Harn L. Su Y.-K. 《Selected Areas in Communications, IEEE Journal on》1989,7(4):534-539
Two algorithms are proposed to improve the Merkle-Hellman knapsack public-key cryptosystem. an approach to transform a superincreasing sequence to a high-density knapsack sequence is proposed. The algorithm is easy to implement and eliminates the redundancy of many knapsack cryptosystems. A linear shift method is used to improve the security of the knapsack public-key cryptosystem. It is shown that several knapsacks (e.g., the so-called useless knapsack), which cannot be generated by using the Merkle-Hellman scheme, can be generated by the linear shift method. Thus A. Shamir's (1982, 1984) attack to the original knapsack, as well as the low-density attack to the iterated knapsack, cannot be applied to this system successfully. It is interesting to note that the concept of the requirement of being one-to-one in practical enciphering keys is not necessary for this system.<> 相似文献
2.
3.
Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature scheme 总被引:1,自引:0,他引:1
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(4):594-601
The basic Merkle-Hellman additive trapdoor knapsack public-key cryptosystem was recently shown to be insecure, and attacks have also been developed on stronger variants of it, such as the Graham-Shamir system and the iterated knapsack cryptosystem. It is shown that some simple variants of another Merkle-Hellman system, the multiplicative knapsack cryptosystem, are insecure. It is also shown that the Shamir fast signature scheme can be broken quickly. Similar attacks can also be used to break the Schöbi-Massey authentication scheme. These attacks have not been rigorously proved to succeed, but heuristic arguments and empirical evidence indicate that they work on systems of practical size. 相似文献
4.
文中给出基于背包和有限域上圆锥曲线相结合的代理签名方案,并具体分析了该代理签名方案的安全性是基于求解有限域上圆锥曲线的离散对数问题和求解变形的背包问题,只有这两个问题都被攻破了,才能破解该代理签名方案,所以该代理签名方案具有很强的安全性。 相似文献
5.
基于Niederreiter纠错码的公钥密码体制的研究 总被引:1,自引:0,他引:1
二十多年来,纠错码成功地用于构造诸多纠错码公钥密码体制。文中首先研究了N公钥体制的性能指标,给出了它的计算机模拟曲线;通过分析N公钥体制的安全性,给出了一种攻击N公钥体制的新方法;然后探讨M公钥体制与N公钥体制的内在关系,揭示了它们之间安全性等价的事实,给出了M公钥与N公钥体制性能比较的结果。 相似文献
6.
Hung-Min Sun 《Communications Letters, IEEE》2001,5(2):61-63
The theory of generalized inverses of matrices over finite fields has been proposed as a potential tool in cryptographic research for the past two years. Recently, Wu and Dawson (see IEE Proc., Comput. Digit. Tech., vol.145, no.5, p.321-6, 1998) proposed a public-key cryptosystem based on generalized inverses of matrices. In this letter, we show that the Wu-Dawson public-key cryptosystem can be broken by representing the ciphertext as a linear combination of rows according to the public key 相似文献
7.
高密度背包型公钥密码体制的设计 总被引:3,自引:0,他引:3
该文提出了一类新的易解背包问题,基于此问题构造了一个新的加法背包型公钥密码体制。该公钥密码体制具有较高的背包密度,因此可以抵抗低密度子集和攻击。对该密码体制的其它的攻击方法进行了分析。 相似文献
8.
9.
10.
Another practical public-key cryptosystem 总被引:1,自引:0,他引:1
It is shown that the range of the Rabin enciphering function can be expanded and a new public-key cryptosystem is proposed. The enciphering procedure and the deciphering procedure of the cryptosystem are described.<> 相似文献
11.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1984,30(5):699-704
The Merkle-Hellman cryptosystem is one of the two major public-key cryptosystems proposed so far. It is shown that the basic variant of this cryptosystem, in which the elements of the public key are modular multiples of a superincreasing sequence, is breakable in polynomial time. 相似文献
12.
Bergamo P. D'Arco P. De Santis A. Kocarev L. 《IEEE transactions on circuits and systems. I, Regular papers》2005,52(7):1382-1393
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper, we study a public-key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis, it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries if the cryptosystem is used for signing messages. Then, we point out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem, are not secure due to the aforementioned attack. We close the paper by discussing the issues and the possibilities of constructing public-key cryptosystems on real numbers. 相似文献
13.
Chikouche Noureddine Cherif Foudil Cayrel Pierre-Louis Benmohammed Mohamed 《Wireless Personal Communications》2017,96(1):509-527
Code-based cryptography is a very promising research area. It allows the construction of different cryptographic mechanisms (e.g. identification protocol, public-key cryptosystem, etc.). McEliece cryptosystem is the first code-based public-key cryptosystem; several variants of this cryptosystem were proposed to design various security protocols in different systems. In this paper, we present a survey on various and recent authentication protocols in radio frequency identification systems which use diverse variants of the McEliece cryptosystem. Moreover, we discuss the security and the performance of each presented protocol.
相似文献14.
15.
An ID-based cryptosystem based on the discrete logarithm problem 总被引:9,自引:0,他引:9
In a modern network system, data security technologies such as cryptosystems, signature schemes, etc., are indispensable for reliable data transmission. In particular, for a large-scale network, ID-based systems such as the ID-based cryptosystem, the ID-based signature scheme, or the ID-based key distribution system are among the better countermeasures for establishing efficient and secure data transmission systems. The concept of an ID-based cryptosystem has been proposed by A. S?hamir (1985), and it is advantageous to public-key cryptosystems because a large public-key file is not required for such a system. An ID-based cryptosystem based on the discrete logarithm problem is proposed which is one of the earliest realizations in Shamir's sense. The security against a conspiracy of some entities in the proposed system is considered, along with the possibility of establishing a more secure system.<> 相似文献
16.
基于最大秩距离码的McEliece公钥加密方案 总被引:1,自引:0,他引:1
提出了基于最大秩距离码新的McElience公钥密码系统,讨论其可行性及安全性.证明了它比基于纠错码的McElience公钥密码系统里安全。而且,通过引入单向函数.使密码系统能有效地抗击消息重发攻击和相关消患攻击。 相似文献
17.
18.
19.
《IEEE transactions on information theory / Professional Technical Group on Information Theory》1980,26(1):100-102
A public key cryptosystem is suggested in which a message is enciphered by adding its numerical value to a sum of elements selected randomly from a publicly known knapsack, thus enabling multiple mapping of the message. Data expansion is moderate while reasonable security is maintained. Since the selected knapsack elements are message-independent, the encryption is very fast. 相似文献
20.
基于AES和RSA的加密信息传送方案 总被引:3,自引:0,他引:3
刘冰 《信息技术与信息化》2006,(5):65-67
AES私钥密码体制加解密效率高,但在密钥管理方面比较困难,而RSA公钥密码体制不存在密钥管理的问题,但是加解密效率很低。根据这两种密码体制的优缺点,提出了基于AES和RSA的加密信息传送方案。此方案不但改善了RSA加解密的速度慢的缺点,也解决了AES体制申密钥管理因难的问题。 相似文献