【24h】

A Generalized Birthday Problem

机译:广义生日问题

获取原文
获取原文并翻译 | 示例

摘要

We study a k-dimensional generalization of the birthday problem: given k lists of n-bit values, find some way to choose one element from each list so that the resulting k values XOR to zero. For k = 2, this is just the extremely well-known birthday problem, which has a square-root time algorithm with many applications in cryptography. In this paper, we show new algorithms for the case k > 2: we show a cube-root time algorithm for the case of k = 4 lists, and we give an algorithm with subexponential running time when k is unrestricted. We also give several applications to cryptanalysis, describing new subexponential algorithms for constructing one-more forgeries for certain blind signature schemes, for breaking certain incremental hash functions, and for finding low-weight parity check equations for fast correlation attacks on stream ciphers. In these applications, our algorithm runs in O(2~(2n~(1/2))) time for an n-bit modulus, demonstrating that moduli may need to be at least 1600 bits long for security against these new attacks. As an example, we describe the first-known attack with subexponential complexity on Schnorr and Okamoto-Schnorr blind signatures over elliptic curve groups.
机译:我们研究了生日问题的k维概括:给定k个n位值的列表,找到某种方法从每个列表中选择一个元素,以使生成的k个值XOR为零。对于k = 2,这只是一个非常著名的生日问题,它具有平方根时间算法,在密码学中有许多应用。在本文中,我们为k> 2的情况展示了新的算法:对于k = 4个列表的情况,我们展示了立方根时间算法,并且给出了当k不受限制时具有次指数运行时间的算法。我们还为密码分析提供了几种应用程序,描述了新的次指数算法,这些算法用于为某些盲签名方案构造一个或多个伪造,为打破某些增量哈希函数以及为针对流密码的快速相关攻击找到低权重奇偶校验方程。在这些应用中,我们的算法以n位模数在O(2〜(2n〜(1/2)))时间内运行,这表明模量可能至少需要1600位长才能抵御这些新攻击。例如,我们描述了椭圆曲线组上Schnorr和Okamoto-Schnorr盲签名具有次指数复杂度的第一个已知攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号