首页> 外文会议>International Conference on Autonomic and Trusted Computing(ATC 2007); 20070711-13; Hong Kong(CN) >Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005
【24h】

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005

机译:MADNES 2005上的服务器辅助RSA密钥生成协议的密码分析

获取原文
获取原文并翻译 | 示例

摘要

At MADNES 2005, Y. Chen et al. proposed two improved server-aided RSA key generation protocols, which are claimed to be secure against collusion attack. However, at ISPEC 2006, T. Cao et al. presented a collusion attack on Chen's standard server-aided RSA key generation protocol and can get the plaintext from a ciphertext. In this paper, we propose a full cryptanalysis of Chen's two server-aided RSA key generation protocols. Firstly, we give a further analysis of Chen's standard protocol and can recover the factorization of the RSA modulus N with the complexity O(log~3 (N)). Secondly, we propose two collusion attacks on Chen's unbalanced RSA key generation protocol. It is proved that we can decrypt any ciphertext with the complexity O(log~3 (N)) and find the secret prime p with the complexity O(log~4(N)). Therefore, neither of Chen's two server-aided RSA key generation protocols can resist collusion attack.
机译:在MADNES 2005上,Y。Chen等人。提出了两种改进的服务器辅助RSA密钥生成协议,据称它们可防止串通攻击。但是,在ISPEC 2006上,T。Cao等人。提出了针对Chen的标准服务器辅助RSA密钥生成协议的共谋攻击,并且可以从密文中获取纯文本。在本文中,我们提出了对Chen的两个服务器辅助RSA密钥生成协议的完整加密分析。首先,我们对Chen的标准协议进行了进一步的分析,可以恢复复杂度为O(log〜3(N))的RSA模数N的因式分解。其次,我们针对Chen的非平衡RSA密钥生成协议提出了两种共谋攻击。证明了我们可以解密复杂度为O(log〜3(N))的任何密文,并找到复杂度为O(log〜4(N))的秘密素数p。因此,Chen的两个服务器辅助RSA密钥生成协议中​​的任何一个都不能抵抗共谋攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号