期刊文献+

On the Selection of Random Numbers in the ElGamal Algorithm 被引量:4

On the Selection of Random Numbers in the ElGamal Algorithm
下载PDF
导出
摘要 The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated. The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated.
出处 《Journal of Electronic Science and Technology of China》 2006年第1期55-58,共4页 中国电子科技(英文版)
基金 Supported by National Natural Science Foundation of China (No. 60272011) and the Special Fund for Cultivating Excellent Scholars of Beijing Municipality (No.20042D0500103)
关键词 EIGamal algorithm digital signature public-key encryption randomnumber coprimeness EIGamal algorithm digital signature public-key encryption randomnumber coprimeness
  • 相关文献

参考文献6

  • 1Stinson D R.Cryptography: Theory and Practice (second edition)[]..2003
  • 2ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[].IEEE Transactions on Information Theory.1985
  • 3Yang Y,Sun W,Niu X.New Theory of Modern Cryptography[]..2002
  • 4Menezes A J,Oorschot P Van,Vanstone S.Handbook of Applied Cryptography[]..1997
  • 5Mao W.Modern Cryptography: Theory and Practice[]..2004
  • 6Bishop M.Computer Security: Art and Science[]..2005

同被引文献44

  • 1张彤,王育民,李真富.牛顿信道的缺陷及其改进[J].信息安全与通信保密,2000,22(2):22-25. 被引量:3
  • 2董明忠.基于ElGamal算法的网络密钥技术[J].网络安全技术与应用,2005(1):19-21. 被引量:3
  • 3BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[C]//EUROCRYPT '97. Berlin, Germany: Springer- Verlag, 1997: 37-51.
  • 4BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[C]//CRYPTO '97. Berlin, Germany: Springer-Verlag, 1997: 513-525.
  • 5PIRET G; QUISQUATER J J. A differential fault attack technique against SPN structures, with applications to the AES and Khazad[C]//CHES 2003. Berlin, Germany: Springer-Verlag, 2003: 77-88.
  • 6CHONG H K, QUISQUATER J J. Faults, injection methods, and fault attacks[J]. IEEE Design and Test of Computers, 2007, 24(6): 544-555.
  • 7WANG C, GU D, ZHU L. Formalization of fault analysis and a new approach of fault detection[J]. Journal of Shanghai Jiaotong University (Science English Version), 2006, 11(3): 301-306.
  • 8KSNUDSEN L R, MEIER W, PRENEEL B, et al. Analysis methods for (alleged) RC4[C]//ASIACRYPT '98, Berlin, Germany: Springer-Verlag, 1998:327-341.
  • 9MCKAGUE M E. Design and analysis of RC4-like stream ciphers[D]. Waterloo: University of Waterloo, 2005.
  • 10HOCH J, SHAMIR A. Fault analysis of stream ciphers[C]//CHES 2004. Berlin, Germany: Springer-Verlag, 2004: 240-253.

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部