8 research outputs found

    A Fiat-Shamir Implementation Note

    Get PDF
    In the Micali-Shamir paper improving the efficiency of the original Fiat-Shamir protocol, the authors state that (...) not all of the viv_i\u27s will be quadratic residues mod nn. We overcome this technical difficulty with an appropriate perturbation technique (...) This perturbation technique is made more explicit in the associated patent application: Each entity is allowed to modify the standard vjv_j which are QNRs. A particularly simple way to achieve this is to pick a modulus n=pqn=pq where p=3mod8p=3 \bmod 8 and q=7mod8q=7 \bmod 8, since then exactly one of vj,vj,2vj,2vjv_j,-v_j,2v_j,-2v_j is a QR mod nn for any vjv_j. The appropriate variant of each vjv_j can be (...) deduced by the verifier himself during the verification of given signatures. In this short note we clarify the way in which the verifier can infer by himself the appropriate variant of each vjv_j during verification

    Thrifty Zero-Knowledge - When Linear Programming Meets Cryptography

    Get PDF
    We introduce “thrifty” zero-knowledge protocols, or TZK. These protocols are constructed by introducing a bias in the challenge send by the prover. This bias is chosen so as to maximize the security versus effort trade-off. We illustrate the benefits of this approach on several well-known zero-knowledge protocols

    Public-Key Based Lightweight Swarm Authentication

    Get PDF
    We describe a lightweight algorithm performing whole-network authentication in a distributed way. This protocol is more efficient than one-to-one node authentication: it results in less communication, less computation, and overall lower energy consumption. The proposed algorithm is provably secure, and achieves zero-knowledge authentication of a network in a time logarithmic in the number of nodes

    Breaking Symmetric Cryptosystems Using Quantum Period Finding

    Get PDF
    Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography. This motivated the cryptographic community to search for quantum-safe solutions. On the other hand, the impact of quantum computing on secret key cryptography is much less understood. In this paper, we consider attacks where an adversary can query an oracle implementing a cryptographic primitive in a quantum superposition of different states. This model gives a lot of power to the adversary, but recent results show that it is nonetheless possible to build secure cryptosystems in it. We study applications of a quantum procedure called Simon's algorithm (the simplest quantum period finding algorithm) in order to attack symmetric cryptosystems in this model. Following previous works in this direction, we show that several classical attacks based on finding collisions can be dramatically sped up using Simon's algorithm: finding a collision requires Ω(2n/2)\Omega(2^{n/2}) queries in the classical setting, but when collisions happen with some hidden periodicity, they can be found with only O(n)O(n) queries in the quantum model. We obtain attacks with very strong implications. First, we show that the most widely used modes of operation for authentication and authenticated encryption e.g. CBC-MAC, PMAC, GMAC, GCM, and OCB) are completely broken in this security model. Our attacks are also applicable to many CAESAR candidates: CLOC, AEZ, COPA, OTR, POET, OMD, and Minalpher. This is quite surprising compared to the situation with encryption modes: Anand et al. show that standard modes are secure with a quantum-secure PRF. Second, we show that Simon's algorithm can also be applied to slide attacks, leading to an exponential speed-up of a classical symmetric cryptanalysis technique in the quantum model.Comment: 31 pages, 14 figure

    Thrifty Zero-Knowledge

    Full text link

    Persistence of antibiotic resistance genes in large subalpine lakes: the role of anthropogenic pollution and ecological interactions

    No full text
    corecore