首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Polynomial Analysis of DH Secrete Key and Bit Security
作者姓名:JIANGZheng-tao  XUWen-li  WANGYu-min
作者单位:NationalKeyLaboratoryofIntegratedServiceNetworksXidianUniversity,Xi'an710071,Shaanxi,China
基金项目:SupportedbytheSpecialFundsforMajorStateBasicResearchProgramofChina(973Program)(G1999035804)
摘    要:In this paper, we lower the upper bound of the number of solutions of oracle transformation polynomial F(x) over GF(q). So one can also recover all the secrete keys with fewer calls. We use our generalized ““““““““even-and-odd test““““““““ method to recover the least significant p-adic ‘bits‘ of representations of the Lucas Cryptosystem secret keys x. Finally, we analyze the Efficient Compact Subgroup Trace Representation (XTR) Diffie-Hellmen secrete keys and point out that if the order of XTR subgroup has a special form then all the bits of the secrete key of XTR can be recovered form any bit of the exponent x.

关 键 词:多项式转换  密钥  位安全  公钥密码系统  安全分析  Diffie-Hellmen
收稿时间:25 May 2004

Polynomial analysis of DH secrete key and bit security
JIANGZheng-tao XUWen-li WANGYu-min.Polynomial Analysis of DH Secrete Key and Bit Security[J].Wuhan University Journal of Natural Sciences,2005,10(1):239-242.
Authors:Jiang Zheng-tao  Xu Wen-li  Wang Yu-min
Institution:(1) National Key Laboratory of Integrated Service Networks, Xidian University, 710071, Shaanxi Xi'an, China
Abstract:In this paper, we lower the upper bound of the number of solutions of oracle transformation polynomialF(x) overGF(q). So one can also recover all the secrete keys with fewer calls. We use our generalized “even-and-odd test” method to recover the least significantp-adic ‘bits’ of representations of the Lucas Cryptosystem secret keysx. Finally, we analyze the Efficient Compact Subgroup Trace Representation (XTR) Diffie-Hellmen secrete keys and point out that if the order of XTR-subgroup has a special form then all the bits of the secrete key of XTR can be recovered form any bit of the exponentx. Foundation item: Supported by the Special Funds for Major State Basic Research Program of China (973 Program) (G1999035804) Biography: JIANG Zheng-tao (1976-), male, Ph.D candidate, research direction: the theory of public-key cryptography, network security, number theory and its application.
Keywords:public-key cryptosystem  security analysis  polynomial transformation  bit security  Diffie-Hellman  oracle
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号