RSA-OAEP is secure under the RSA assumption

被引:79
作者
Fujisaki, E
Okamoto, T
Pointcheval, D
Stern, J
机构
[1] NTT Labs, Yokosuka, Kanagawa, Japan
[2] ENS, CNRS, Dept Informat, F-75230 Paris 05, France
关键词
public-key encryption; provable security; RSA; OAEP;
D O I
10.1007/s00145-002-0204-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently Victor Shoup noted that there is a gap in the widely believed security result of OAEP against adaptive chosen-ciphertext attacks. Moreover, he showed that, presumably, OAEP cannot be proven Secure from the one-wayness of the underlying trapdoor permutation. This paper establishes another result on the security of OAEP. It proves that OAEP offers semantic security against adaptive chosen-ciphertext attacks, in the random oracle model, under the partial-domain one-wayness of the underlying permutation. Therefore, this uses a formally stronger assumption. Nevertheless, since partial-domain one-wayness of the RSA function is equivalent to its (full-domain) one-wayness, it follows that the security of RSA-OAEP can actually be proven under the sole RSA assumption, although the reduction is not tight.
引用
收藏
页码:81 / 104
页数:24
相关论文
共 50 条
  • [41] Secure and efficient hand-over authentication in WLAN using elliptic curve RSA
    Krishnamoorthy, Murugan
    Perumal, Varalakshmi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 552 - 566
  • [42] An HTTPS approach to Resist Man in the Middle Attack in Secure SMS Using ECC and RSA
    Khan, Muhammad Murad
    Bakhtiari, Majid
    Bakhtiari, Saeid
    2013 13TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA), 2013, : 115 - 120
  • [43] A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography
    Kusuma, Edi Jaya
    Sari, Christy Atika
    Rachmawanto, Eko Hari
    Setiadi, De Rosal Ignatius Moses
    JOURNAL OF ICT RESEARCH AND APPLICATIONS, 2018, 12 (02) : 103 - 122
  • [44] Securing RSA Algorithm against Timing Attack
    Arjunan, Amuthan
    Narayanan, Praveena
    Ramu, Kaviarasan
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2016, 13 (04) : 471 - 476
  • [45] Rsa meets dpa: Recovering rsa secret keys from noisy analog data
    Kunihiro, Noboru
    Honda, Junya
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8731 : 261 - 278
  • [46] Performance Evaluation of RSA-based Secure Cloud Storage Protocol using OpenStack
    Hyder, Muhammad Faraz
    Tooba, Syeda
    Waseemullah
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2021, 11 (04) : 7321 - 7325
  • [47] Side channel attack of multiplication in GF(q) –application to secure RSA-CRT
    Sen XU
    Weija WANG
    Xiangjun LU
    Zheng GUO
    Junrong LIU
    Dawu GU
    ScienceChina(InformationSciences), 2019, 62 (03) : 202 - 204
  • [48] RSA and SFQ based Secure Heuristic Load Balancing Approach for Cloud Data Centers
    Dey, Sweta
    Kaur, Kiran Preet
    Mehak
    Kaur, Upinder
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [49] Combinations of resting RSA and RSA reactivity impact maladaptive mood repair and depression symptoms
    Yaroslavsky, Ilya
    Bylsma, Lauren M.
    Rottenberg, Jonathan
    Kovacs, Maria
    BIOLOGICAL PSYCHOLOGY, 2013, 94 (02) : 272 - 281
  • [50] RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data
    Kunihiro, Noboru
    Honda, Junya
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2014, 2014, 8731 : 261 - 278