10.12.2012 Views

Prime Numbers

Prime Numbers

Prime Numbers

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

432 Chapter 8 THE UBIQUITY OF PRIME NUMBERS<br />

Argue now that the private key D can be obtained (since you know the<br />

public pair N,E) in polynomial effort (operation count bounded by a<br />

power of ln N).<br />

(4) So-called timing attacks have also been developed. If a machine calculates<br />

numbers such as xD using a power ladder whose square and multiply<br />

operations take different but fixed times, one can glean information about<br />

the exponent D. Say that you demand of a cryptosystem the generation<br />

of many signatures x D i<br />

mod N for i running through some set, and that<br />

you store the respective times Ti required for the signing system to give<br />

the i-th signature. Then do the same timing experiment but for each x 3 i ,<br />

say. Describe how correlations between the sets {ti} and {Ti} can be used<br />

to determine bits of the private exponent D.<br />

We have given above just a smattering of RSA attack notions. There are<br />

also attacks based on lattice reduction [Coppersmith 1997] and interesting<br />

issues involving the (incomplete) relation between factoring and breaking RSA<br />

[Boneh and Venkatesan 1998]. There also exist surveys on this general topic<br />

[Boneh 1999]. We are grateful to D. Cao for providing some ideas for this<br />

exercise.<br />

8.3. We have noted that both y-coordinates and the “clue” point are not<br />

fundamentally necessary in the transmission of embedded encryption from<br />

Algorithm 8.1.10. With a view to Algorithm 7.2.8 and the Miller generator,<br />

equation (8.1), work out an explicit, detailed algorithm for direct embedding<br />

but with neither y-coordinates nor data expansion (except that one will still<br />

need to transmit the sign bit d—an asymptotically negligible expansion). You<br />

might elect to use a few more “parity bits,” for example in Algorithm 7.2.8<br />

you may wish to specify one of two quadratic roots, and so on.<br />

8.4. Describe how one may embed any plaintext integer X ∈{0,...,p− 1}<br />

on a single given curve, by somehow counting up from X as necessary, until<br />

X 3 + aX + b is a quadratic residue (mod p). One such scheme is described in<br />

[Koblitz 1987].<br />

8.5. In Algorithm 8.1.10 when is it the case that X is the x-coordinate of a<br />

point on both curves E,E ′ ?<br />

8.6. Whenever we use Montgomery parameterization (Algorithm 7.2.7) in<br />

any cryptographic mode, we do not have access to the precise Y -coordinate.<br />

Actually, for the Montgomery (X, Z) pair we know that Y 2 = (X/Z) 3 +<br />

c(X/Z) 2 + a(X/Z) +b, thustherecanbetwopossiblerootsforY . Explain<br />

how, if Alice is to communicate to Bob a point (X, Y ) on the curve, then she<br />

can effect so-called “point compression,” meaning that she can send Bob the<br />

X coordinate and just a very little bit more.<br />

But before she can send accurate information, Alice still needs to know<br />

herself which is the correct Y root. Design a cryptographic scheme (e.g.,<br />

key exchange) where Montgomery (X, Z) algebra is used but Y is somehow<br />

recovered. (One reason to have Y present is simply that some current industry

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!