Exponential sums and lattice reduction: Applications to cryptography

被引:0
作者
Shparlinski, IE [1 ]
机构
[1] Macquarie Univ, Dept Comp, Sydney, NSW 2109, Australia
来源
FINITE FIELDS WITH APPLICATIONS TO CODING THEORY, CRYPTOGRAPHY AND RELATED AREAS | 2002年
关键词
D O I
暂无
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
We describe a rather surprising, yet powerful, combination of two famous number theoretic techniques: bounds of exponential sums and lattice reduction algorithms. This combination has led to a number of cryptographic applications, helping to make rigorous several heuristic approaches and provides a two edge sword to defend and attack. It can be used prove important security results arid also to create powerful attacks. The examples of the first group include results about the bit security of the Diffie-Hellman key exchange system, of the Shamir message passing scheme and of the XTR and LUC cryptosystems. The examples of the second group include attacks on the Digital Signature Scheme and its modifications which are provably insecure under certain conditions.
引用
收藏
页码:286 / 298
页数:13
相关论文
共 44 条
[1]  
[Anonymous], 1988, ANN MATH STUD
[2]   ON LOVASZ LATTICE REDUCTION AND THE NEAREST LATTICE POINT PROBLEM [J].
BABAI, L .
COMBINATORICA, 1986, 6 (01) :1-13
[3]  
Bleichenbacher D, 1995, LECT NOTES COMPUT SC, V963, P386
[4]  
Boneh D, 1997, PROCEEDINGS OF THE EIGHTH ANNUAL ACM-SIAM SYMPOSIUM ON DISCRETE ALGORITHMS, P675
[5]  
BONEH D, 1996, LECT NOTES COMPUTER, V1109, P129, DOI DOI 10.1007/3-540-68697-5
[6]  
BONEH D, 2001, LECT NOTES COMP SCI, V2139, P201
[7]  
BROWN DRL, 2001, 200150 CORR U WAT FA, P1
[8]   On the statistical properties of Diffie-Hellman distributions [J].
Canetti, R ;
Friedlander, J ;
Konyagin, S ;
Larsen, M ;
Lieman, D ;
Shparlinski, I .
ISRAEL JOURNAL OF MATHEMATICS, 2000, 120 (1) :23-46
[9]  
Deligne P., 1977, Lecture Notes in Math., V569
[10]  
El Mahassni E, 2001, LECT NOTES COMPUT SC, V2146, P97