Cryptanalysis of El-Gamal AAs cryptosystem
In this research, we strengthen the security of the El-Gamal Cryptosystem, simply referred as the AAs cryptosystem. The key exchange protocol of the AAs cryptosystem is analogous to the Diffie-Hellman key exchange protocol. The encryption and decryption processes of the AAs -cryptosystem are efficie...
Saved in:
主要作者: | |
---|---|
格式: | Thesis |
语言: | English English |
出版: |
2011
|
主题: | |
在线阅读: | http://psasir.upm.edu.my/id/eprint/26778/1/IPM%202011%2017R.pdf |
标签: |
添加标签
没有标签, 成为第一个标记此记录!
|
id |
my-upm-ir.26778 |
---|---|
record_format |
uketd_dc |
spelling |
my-upm-ir.267782022-01-26T05:36:46Z Cryptanalysis of El-Gamal AAs cryptosystem 2011-04 Mandangan, Arif In this research, we strengthen the security of the El-Gamal Cryptosystem, simply referred as the AAs cryptosystem. The key exchange protocol of the AAs cryptosystem is analogous to the Diffie-Hellman key exchange protocol. The encryption and decryption processes of the AAs -cryptosystem are efficient since the operations involved are the simple addition and subtraction modulo 1. Unfortunately, the AAs cryptosystem was successfully attacked by the passive adversary attack. This attack is manipulating the weaknesses of the public key and encrypting/decrypting keys structure. The hard mathematical problem of the AAs cryptosystem has been reduced to the Discrete Logarithm Problem Modulo 1 which can be solved by using the passive adversary attack. As a solution, we redefined the structure of the public key and encrypting/decrypting keys. We propose a new secret parameter that plays an important role in the computation of the encrypting/decrypting keys. Without the correct combination of the secret parameters, the adversary will not be able to compute the encrypting/decrypting keys. The Discrete Logarithm Problem Modulo 1 for the strengthened –cryptosystem is more difficult than the previous one. Now the adversary needs to find two secret parameters and this task could not be done via the passive adversary attack. Furthermore we propose some attacks which aim to get the secret parameters which are used in the calculation of the encrypting/decrypting keys. Those attacks are the exhaustive search attack on the secret parameters and the linear Diophantine equation attack. We show that these attacks fail to get the correct secret parameters efficiently. Finally we redefined the hard mathematical problem of the strengthened AAs cryptosystem. To break the security of the strengthened AAs cryptosystem, one needs to find the private key. By choosing sufficiently large private key size, it is computationally infeasible to reveal the value of the private key via the exhaustive search attack. Therefore, the AAs cryptosystem has a potential to be a secure cryptosystem. Cryptography Computer security 2011-04 Thesis http://psasir.upm.edu.my/id/eprint/26778/ http://psasir.upm.edu.my/id/eprint/26778/1/IPM%202011%2017R.pdf application/pdf en public masters Universiti Putra Malaysia Cryptography Computer security Institute for Mathematical Research English |
institution |
Universiti Putra Malaysia |
collection |
PSAS Institutional Repository |
language |
English English |
topic |
Cryptography Computer security |
spellingShingle |
Cryptography Computer security Mandangan, Arif Cryptanalysis of El-Gamal AAs cryptosystem |
description |
In this research, we strengthen the security of the El-Gamal Cryptosystem, simply referred as the AAs cryptosystem. The key exchange protocol of the AAs cryptosystem is analogous to the Diffie-Hellman key exchange protocol. The encryption and decryption processes of the AAs -cryptosystem are efficient since the operations involved are the simple addition and subtraction modulo 1. Unfortunately, the AAs cryptosystem was successfully attacked by the passive adversary attack. This attack is manipulating the weaknesses of the public key and encrypting/decrypting keys structure. The hard mathematical problem of the AAs cryptosystem has been reduced to the Discrete Logarithm Problem Modulo 1 which can be solved by using the passive adversary attack. As a solution, we redefined the structure of the public key and encrypting/decrypting keys. We propose a new secret parameter that plays an important role in the computation of the encrypting/decrypting keys. Without the correct combination of the secret parameters, the adversary will not be able to compute the encrypting/decrypting keys. The Discrete Logarithm Problem Modulo 1 for the strengthened –cryptosystem is more difficult than the previous one. Now the adversary needs to find two secret parameters and this task could not be done via the passive adversary attack. Furthermore we propose some attacks which aim to get the secret parameters which are used in the calculation of the encrypting/decrypting keys. Those attacks are the exhaustive search attack on the secret parameters and the linear Diophantine equation attack. We show that these attacks fail to get the correct secret parameters efficiently. Finally we redefined the hard mathematical problem of the strengthened AAs cryptosystem. To break the security of the strengthened AAs cryptosystem, one needs to find the private key. By choosing sufficiently large private key size, it is computationally infeasible to reveal the value of the private key via the exhaustive search attack. Therefore, the AAs cryptosystem has a potential to be a secure cryptosystem. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Mandangan, Arif |
author_facet |
Mandangan, Arif |
author_sort |
Mandangan, Arif |
title |
Cryptanalysis of El-Gamal AAs cryptosystem |
title_short |
Cryptanalysis of El-Gamal AAs cryptosystem |
title_full |
Cryptanalysis of El-Gamal AAs cryptosystem |
title_fullStr |
Cryptanalysis of El-Gamal AAs cryptosystem |
title_full_unstemmed |
Cryptanalysis of El-Gamal AAs cryptosystem |
title_sort |
cryptanalysis of el-gamal aas cryptosystem |
granting_institution |
Universiti Putra Malaysia |
granting_department |
Institute for Mathematical Research |
publishDate |
2011 |
url |
http://psasir.upm.edu.my/id/eprint/26778/1/IPM%202011%2017R.pdf |
_version_ |
1747811560731967488 |