Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm based public-key cryptosystem set in a group of prime order p where p-1 has small divisors. Unlike the weak private keys based on numerical size (such as smaller private keys, or private keys lying in an interval) that will always exist in any DLP cryptosystems, our type of weak private keys occurs purely due to parameter choice of p, and hence, can be removed with appropriate value of p. Using the theory of implicit group representations, we present algorithms that can determine whether a key is weak, and if so, recover the private key from the corresponding public key. We analyze several elliptic curves proposed in the literature and in various standards, giving counts of the number of keys that can be broken with relatively small amounts of computation. Our results show that many of these curves, including some from standards, have a considerable number of such weak private keys. We also use our methods to show that none of the 14 outstanding Certicom Challenge problem instances are weak in our sense, up to a certain weakness bound.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/17/2019

A Public-Key Cryptosystem Using Cyclotomic Matrices

Confidentiality and Integrity are two paramount objectives of asymmetric...
research
12/24/2019

Smooth Operator – The Use of Smooth Integers in Fast Generation of RSA Keys

Primality generation is the cornerstone of several essential cryptograph...
research
09/14/2020

Biased RSA private keys: Origin attribution of GCD-factorable keys

In 2016, Svenda et al. (USENIX 2016, The Million-key Question) reported ...
research
12/19/2019

A Restrained Paillier Cryptosystem and Its Applications for Access Control of Common Secret

The modified Paillier cryptosystem has become extremely popular and appl...
research
07/19/2022

Blindfold: Keeping Private Keys in PKIs and CDNs out of Sight

Public key infrastructure (PKI) is a certificate-based technology that h...
research
04/29/2022

Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

The evolution of quantum computers poses a serious threat to contemporar...
research
10/25/2020

Differentially Private Weighted Sampling

Common datasets have the form of elements with keys (e.g., transactions ...

Please sign up or login with your details

Forgot password? Click here to reset