Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cryptanalysis of certain variants of Rabin’s signature scheme
Shamir A., Schnorr C. Information Processing Letters19 (3):113-115,1984.Type:Article
Date Reviewed: May 1 1985

Rabin has proposed a public key signature scheme, based on the RSA cryptosystem, in which the difficulty of forging signatures is equivalent to the difficulty of factoring integers. Although there is an apparent cleartext attack on the scheme, this can be thwarted by perturbing the bits of the message before it is sent. (Rabin’s suggested perturbation is: if the number n to factor is assumed to be 500 bits long, to add 60 random bits to the message, and then to compress the message with a one-way function.)

The possible problem with this scheme is the temptation not to compress if the message, after the random bits have been added, is still less than 500 bits (this could be the case for a logon procedure, for example). The authors show that if compression is not done, the method can be as easy to attack (given the above parameters of number of bits) as factoring 120-bit numbers (36 decimal digits), something which is essentially trivial even on a VAX. Their attack would be successful unless most of the bits of the original message have been perturbed by the various transformations. This paper is short, clear, complete, and well worth reading.

Reviewer:  D. A. Buell Review #: CR109125
Bookmark and Share
 
Public Key Cryptosystems (E.3 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy