Determining the Optimal Random-padding Size for Rabin Cryptosystems

07/16/2018
by   Masahiro Kaminaga, et al.
0

Rabin encryption and a secure ownership transfer protocol based on the difficulty of factorization of a public key use a small public exponent. Such encryption requires random number padding. The Coppersmith's shortpad attack works effectively on short padding, thereby allowing an adversary to extract the secret message. However, the criteria for determining the appropriate padding size remains unclear. In this paper, we derived the processing-time formula for the shortpad attack and determined the optimal random-padding size in order to achieve the desired security.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/23/2021

An analysis of Coggia-Couvreur attack on Loidreau's rank-metric public key encryption scheme in the general case

In this paper we show that in the case where the public-key can be disti...
research
10/22/2018

Cryptographic analysis of the Modified Matrix Modular Cryptosystem

We show that the Modified Matrix Modular Cryptosystem proposed by S.K. R...
research
12/31/2022

RSA+: An algorithm at least as secure as RSA

The RSA algorithm has been around for nearly five decades and remains on...
research
02/21/2018

How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

We study secure and undetectable communication in a world where governme...
research
12/06/2019

Advanced attribute-based protocol based on the modified secret sharing scheme

We construct a new protocol for attribute-based encryption with the use ...
research
05/25/2022

Deniable Steganography

Steganography conceals the secret message into the cover media, generati...
research
04/08/2023

A Continued Fraction-Hyperbola based Attack on RSA cryptosystem

In this paper we present new arithmetical and algebraic results followin...

Please sign up or login with your details

Forgot password? Click here to reset