期刊文献+

On the Selection of Random Numbers in the ElGamal Algorithm 被引量:4

On the Selection of Random Numbers in the ElGamal Algorithm
在线阅读 下载PDF
导出
摘要 The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated. The EIGamal algorithm, which can be used for both signature and encryption, is of importance in public-key cryptosystems. However, there has arisen an issue that different criteria of selecting a random number are used for the same algorithm. In the aspects of the sufficiency, necessity, security and computational overhead of parameter selection, this paper analyzes these criteria in a comparative manner and points out the insecurities in some textbook cryptographic schemes. Meanwhile, in order to enhance security a novel generalization of the EIGamal signature scheme is made by expanding the range of selecting random numbers at an acceptable cost of additional computation, and its feasibility is demonstrated.
出处 《Journal of Electronic Science and Technology of China》 2006年第1期55-58,共4页 中国电子科技(英文版)
基金 Supported by National Natural Science Foundation of China (No. 60272011) and the Special Fund for Cultivating Excellent Scholars of Beijing Municipality (No.20042D0500103)
关键词 EIGamal algorithm digital signature public-key encryption randomnumber coprimeness EIGamal algorithm digital signature public-key encryption randomnumber coprimeness
作者简介 YANG Jun (杨军) was born in Chongqing, China, in 1963. He received the B.Se. degree in mathematics from Southwest China Normal University in 1985 and the M.S. degree in applied mathematics from Siehuan University in 2002. He is currently a Ph.D. candidate majoring in computer applications at University of Science and Technology Beijing and an associate professor with Fuling Normal College. His research interests include applied cryptography, multieast security and group key management.ZHOU Xian-wei (周贤伟) was bom in Sichuan, China, in 1963. He is currently a postdoctoral researcher with the School of Information Engineering, University of Science and Technology Beijing. He has published more than 50 papers in important academic journals. His research fields include communication network security, broadband mobile communications and multieast security.QIN Bo-ping (覃伯平) was bom in Sichuan, China, in 1971. He received the B.Sc. degree in mathematics from Southwest China Normal University in 1993 and the M.S. degree in management from Beijing University of Aeronautics and Astronautics in 2002. He is currently a Ph.D. candidate majoring in computer applications at University of Science and Technology Beijing. His research interests include applied cryptography, network security and sensor networks.
  • 相关文献

参考文献6

  • 1Stinson D R.Cryptography: Theory and Practice (second edition)[]..2003
  • 2ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[].IEEE Transactions on Information Theory.1985
  • 3Yang Y,Sun W,Niu X.New Theory of Modern Cryptography[]..2002
  • 4Menezes A J,Oorschot P Van,Vanstone S.Handbook of Applied Cryptography[]..1997
  • 5Mao W.Modern Cryptography: Theory and Practice[]..2004
  • 6Bishop M.Computer Security: Art and Science[]..2005

同被引文献44

  • 1张彤,王育民,李真富.牛顿信道的缺陷及其改进[J].信息安全与通信保密,2000,22(2):22-25. 被引量:3
  • 2董明忠.基于ElGamal算法的网络密钥技术[J].网络安全技术与应用,2005(1):19-21. 被引量:3
  • 3BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[C]//EUROCRYPT '97. Berlin, Germany: Springer- Verlag, 1997: 37-51.
  • 4BIHAM E, SHAMIR A. Differential fault analysis of secret key cryptosystems[C]//CRYPTO '97. Berlin, Germany: Springer-Verlag, 1997: 513-525.
  • 5PIRET G; QUISQUATER J J. A differential fault attack technique against SPN structures, with applications to the AES and Khazad[C]//CHES 2003. Berlin, Germany: Springer-Verlag, 2003: 77-88.
  • 6CHONG H K, QUISQUATER J J. Faults, injection methods, and fault attacks[J]. IEEE Design and Test of Computers, 2007, 24(6): 544-555.
  • 7WANG C, GU D, ZHU L. Formalization of fault analysis and a new approach of fault detection[J]. Journal of Shanghai Jiaotong University (Science English Version), 2006, 11(3): 301-306.
  • 8KSNUDSEN L R, MEIER W, PRENEEL B, et al. Analysis methods for (alleged) RC4[C]//ASIACRYPT '98, Berlin, Germany: Springer-Verlag, 1998:327-341.
  • 9MCKAGUE M E. Design and analysis of RC4-like stream ciphers[D]. Waterloo: University of Waterloo, 2005.
  • 10HOCH J, SHAMIR A. Fault analysis of stream ciphers[C]//CHES 2004. Berlin, Germany: Springer-Verlag, 2004: 240-253.

引证文献4

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部