* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Cryptanalysis of Shieh-Lin-Yang
Secret sharing wikipedia , lookup
Cryptography wikipedia , lookup
One-time pad wikipedia , lookup
Determination of the day of the week wikipedia , lookup
Cryptanalysis wikipedia , lookup
Post-quantum cryptography wikipedia , lookup
Diffie–Hellman key exchange wikipedia , lookup
Cryptanalysis of Shieh-Lin-YangSun Signature Scheme Source: IEEE COMMUNICATIONS LETTERS, Vol. 7, No. 4, APRIL. 2003, pp. 195-196 Authors: Shin-Jia Hwang and En-Ti Li Speaker: Hao-Wen Huang Date: 2004/10/ 1 Outline Brief review of Shieh et al’.’s scheme Forgery attack Conclusions 2 Brief review of Shieh et al’.’s sheme(1) p: be a large prime.( public parameter ) : be a primitive element in GF(p).( public parameter ) Xi: Ui’s private key. Uniformly between 0 and p-1 such that gcd( Xi,p-1 )=1. Yi : Ui’s public key. Yi=()Xi mod p 3 Brief review of Shieh et al’.’s sheme(2) Uj Ui Signature={ti, ri, S} 1) Compute S= (Yi)m mod p , message m Zp 2) Select a random number ki between 1 and p-1. Compute ri= [m*()-ki] mod p 3) Solve ti from the following congruence equation: (S+ti) = (Xi)-1(ki-ri) mod (p-1) 4 Brief review of Shieh et al’.’s sheme(3) Uj The Signature Verification and Recovery step1) perform the formula to recover m. (Yi)S+ti ∙ ri∙ () ri = ( m mod p) step2) check S ?= (Yi)m mod p . if the above statement holds, the authenticity of the initial signature is verified 5 Brief review of Shieh et al’.’s sheme(4) The Parallel Multisignature Scheme The message m is first signed by an initiator U1, and then is sent separately to all signer. Finally,U1 is responsible for combining these individual signature into a multisignature. 6 Brief review of Shieh et al’.’s sheme(5) The Serial Multisignature Scheme In the serial multisignature scheme, the trusted center can play the role of the public notary (PN). The responsibility of PN is to endorse the signatures and manage users’ public keys. 7 Forgery attack on Shieh et al.’s scheme(1) One major characteristic of these schemes is to avoid using one-way hash functions and message redundancy schemes. However, this causes some security flaw. 8 Forgery attack on Shieh et al.’s scheme(2) Performs the following six steps to forge the signature( ti’,ri’,S’ ) Select a random integer in{1,2,….,p-1} and suppose = ti’+ S’ mod (p-1). Choose a value of ri’ in GF(p) randomly. ki’ by ki’ = (Y ) x ri’ mod p without Compute the value of i knowing the value of ki’. ki’ mod p. Obtain the message M = ri’ x M Compute S’ = (Yi) mod p. Compute ti’ = -S’ mod (p-1). 9 Forgery attack on Shieh et al.’s scheme(3) (Yi)ti’+S’ x ri’ x ()ri’ mod p ={ (Yi)( ti’+S’ ) x M x [()ki]-1 x ()ri’ } mod p ={ (Yi) x M x [()ki’]-1 x ()ri’ } mod p ={()ki’ x [()ri’ ’]-1 x M x [()ki’]-1 x ()ri’ } mod p = M mod p Then the message M will pass the verification S’ = (Yi)M mod p 10 Conclusions To overcome this problem, the straightforward way is to adopt the message redundancy schemes. 11