The Rabin cryptosystem revisited
Michele Elia1,Matteo Piva2, Davide Schipani3 Mykonos, 30th May 2012
1Polytechnic of Turin 2Univesity of Trento 3University of Zurich M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 1 / 17
The Rabin cryptosystem revisited Michele Elia 1 , Matteo Piva 2 , - - PowerPoint PPT Presentation
The Rabin cryptosystem revisited Michele Elia 1 , Matteo Piva 2 , Davide Schipani 3 Mykonos, 30th May 2012 1 Polytechnic of Turin 2 Univesity of Trento 3 University of Zurich M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May
1Polytechnic of Turin 2Univesity of Trento 3University of Zurich M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 1 / 17
1
2
3
4
5
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 2 / 17
N be a message, the encryption is
N.
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 3 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 4 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 5 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 6 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 7 / 17
k
2
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 8 / 17
1 h1 = h2 mod k =
2 s(−h, k) = −s(h, k) 3 s(h, k) + s(k, h) = − 1
4 + 1 12
k + 1 hk + k h
4 12s(h, k) = k + 1 − 2
k
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 9 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 10 / 17
C = m2 mod N, b0 = m mod 2, b1 = 1 2 m N
2
N
2
N
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 11 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 12 / 17
C = m2 mod N, b0 = m mod 2, b1 = s(m, N) mod 2
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 12 / 17
C = m2 mod N, b0 = m mod 2, b1 = s(m, N) mod 2
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 12 / 17
position i the bit b1 pertaining to the message m = i. The list makes the task theoretically feasible, although its size is of exponential complexity with respect to N and thus practically unrealizable.
distinguish numbers of opposite sign. Higher power residue symbols could in principle works but their use unveils the factorization of N.
L(x) =
N−1
(1 − (x − j)P−1)[(j mod p) + (j mod q) mod 2]
distinguish the roots, but its complexity is prohibitive Group isomorphism. Use a function χ from ZN into a finite group G. The limitation of this scheme is that χ must be a one-way function
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 13 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 14 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 15 / 17
R a random number f1 =
p
q
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 15 / 17
R a random number f1 =
p
q
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 15 / 17
1
the root identification requires the delivery of additional information, which may not be easily computed, especially when not both primes are Blum primes;
2
the delivery of two bits together with the encrypted message exposes the process to active attacks by maliciously modifying these bits.
3
The Rabin scheme may come with some hindrance when used to conceal a message,
4
The Rabin scheme seems effective when applied to generate electronic signature.
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 16 / 17
M.Piva (University of Trento) Rabin cryptosystem Mykonos, 30th May 2012 17 / 17