期刊文献+

基于多播RSA的“零密钥更新”方案的安全分析

Security analysis of "zero rekeying" scheme based on multi-cast RSA
下载PDF
导出
摘要 Lin,Tang和Wang(LTW)基于一种星型密钥分发体系结构提出了一种多素数RSA,并利用它构造了一种无需密钥更新过程的集中式组密钥管理方案。按照组密钥管理的几个主要安全需求,运用密码学的工程实践视角和计算数论的方法,对该方案提出了环幂等元攻击、选择明文攻击、求高次整根攻击以及基于椭圆曲线分解方法和中国剩余定理的串谋攻击。数学与密码分析表明:在一定的条件下可以高效实现这些攻击,而密钥服务器的加密指数的"零更新"特性正是这些安全隐患之源。 Recently, Lin, Tang and Wang proposed a multi-prime RSA based on a star architecture of key distribution and made use of it to construct a centralized group key management scheme. According to several main security requirements of group key management, from the perspective of cryptographic engineering practice and applying computational number theory, four kinds of attacks against this scheme were proposed: a ring idempotent attack, a chosen plaintext attack, an attack of extracting high order integer roots, and a collusion attack based on the elliptic curve factoring method and Chinese remainder theorem. The mathematical analysis and cryptanalysis indicate that under certain conditions these attacks can be realized efficiently, and it is the characteristic of "without rekeying the key server's eneryption exponent" that causes such security risks.
出处 《计算机应用》 CSCD 北大核心 2011年第3期793-797,共5页 journal of Computer Applications
基金 国家民族事务委员会自然科学研究基金资助项目(20100706)
关键词 信息安全 组密钥管理 “1影响n”问题 多素数RSA 椭圆曲线分解方法 中国剩余定理 information security group key management "l-affects-n" problem multi-prime RSA elliptic curve factoring method Chinese remainder theorem
  • 相关文献

参考文献15

  • 1HUR J, PARK C, YOON H. Chosen ciphertext secure authentica-ted group communication using identity-based signcryption [ J]. Computers and Mathematics with Applications, 2010, 60(2) : 362 - 375.
  • 2Ferguson,N.密码学实践[M].张振峰,等译.北京:电子工业出版社,2005.
  • 3HARDJONO T, DONDETI L R. Muhicast and group security [ M]. Norwood, Massachusetts: Artech House, 2003.
  • 4CHALLAL Y, BOUABDALLAH A, SEBA H. A taxonomy of group key management protocols: Issues and solutions [ J]. Transactions on Engineering, Computing and Technology, 2005, 6(2) : 5 - 17.
  • 5WONG C K, GOUDA M, LAM S S. Secure group communications using key graphs [ J]. IEEE/ACM Transactions on Networking, 2000, 8(1): 16-31.
  • 6MENEZES A J, van OORSCHOT P C, VANSTONE S A. Handbook of applied cryptography [ M]. Boca Raton: The Chemical Rubber Company Press, 1997.
  • 7SCHNEIER B.应用密码学:协议,算法与C源程序[M].吴世忠,祝世雄,张文政等,译.北京:机械工业出版社,2000.
  • 8LENSTRA A K. Computational methods in public key cryptology [ M]// NIEDERREITER H. Coding theory and cryptology. Singa- pore: Singapore University Press and World Scientific Publishing, 2002:175 -238.
  • 9LENSTRA A K, de WEGER B M M. Twin RSA [ C]//Progress in Cryptology- Mycrypt 2005, LNCS 3715. Berlin: Springer-Verlag, 2005:222-228.
  • 10LIN I C, TANG S S, WANG C M. Muhicast key management without rekeying processes [ J]. The Computer Journal, 2010, 53 (7) : 939 -950.

共引文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部