Advances in Cryptology

The undecidable word problem for groups and semlgroups is investigated as a basis for a public-key cryptosystem. A specific approach is discussed along with the results of an experimental implementation. This approach does not give a provably secure or practical system, but shows the type of cryptosystem that could be constructed around the word problem. This cryptosystem is randomized, with infinitely many ciphertexts corresponding t o each plaintext. 1. NP-COMPLETE PROBLEMS. The idea of using an NP-complete problem to construct a public-key cryptosystem (PKC) seemed promising [Diff76], but has not been successful historically. The earliest such PKC was based on the integer knapsack problem, and recently various versions of this PKC have been broken by general, powerful attacks [Sha83al, IAdle831. (In this case, the attacks have been carried out on the type of trapdoor inserted, and not directly on the This work was supported in part by NSF grant DCR-8403350, and by Drexel University's Faculty Development Mini-Grant program G.R. Blakley and D. Chaum (Eds.): Advances in Cryptology CRYPT0 '84, LNCS 196, pp. 19-36, 1985. 0 Springer-Verlag Berlin Heidelberg 1985

[1]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[2]  E. Berlekamp Factoring polynomials over large finite fields* , 1970, SYMSAC '71.

[3]  W. Heisenberg Physics and Beyond , 1971 .

[4]  F. MacWilliams,et al.  Codes which detect deception , 1974 .

[5]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[6]  Abraham Lempel,et al.  On the Complexity of Finite Sequences , 1976, IEEE Trans. Inf. Theory.

[7]  Gary D. Knott,et al.  A Numbering System for Permutations of Combinations , 1976, Commun. ACM.

[8]  James A. Reeds,et al.  "Cracking" a Random Number Generator , 1977, Cryptologia.

[9]  Adi Shamir,et al.  On Digital Signatures and Public-Key Cryptosystems. , 1977 .

[10]  Volker Strassen,et al.  A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..

[11]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[12]  Martin E. Hellman,et al.  Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.

[13]  Martin E. Hellman,et al.  An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.

[14]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[15]  Gilles Brassard,et al.  A note on the complexity of cryptography (Corresp.) , 1979, IEEE Trans. Inf. Theory.

[16]  Richard J. Lipton,et al.  Protecting Shared Cryptographic Keys , 1980, 1980 IEEE Symposium on Security and Privacy.

[17]  Michael O. Rabin,et al.  Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..

[18]  G. Blakley,et al.  An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems , 1981 .

[19]  G. R. Blakley,et al.  Security Proofs for Information Protection Systems , 1981, 1981 IEEE Symposium on Security and Privacy.

[20]  Elliot Fischer Measuring Cryptographic Performance with Production Processes , 1981, Cryptologia.

[21]  G. R. Blakley,et al.  Infinite Structures in Information Theory , 1982, CRYPTO.

[22]  J. Boyar Inferring a Sequence Generated by a Linear Congruence , 1982, FOCS.

[23]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[24]  Silvio Micali,et al.  Why and how to establish a private code on a public network , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[25]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[26]  Leonard M. Adleman,et al.  On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem , 1982, CRYPTO.

[27]  Joos Vandewalle,et al.  Analytical Characteristics of the DES , 1983, CRYPTO.

[28]  Ehud D. Karnin,et al.  On secret sharing systems , 1983, IEEE Trans. Inf. Theory.

[29]  J. T. Cross THE EULER 4-FUNCTION IN THE GAUSSIAN INTEGERS , 1983 .

[30]  Vijay V. Vazirani,et al.  Trapdoor pseudo-random number generators, with applications to protocol design , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).

[31]  Manuel Blum How to exchange (secret) keys , 1983, STOC '83.

[32]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[33]  Adi Shamir,et al.  On the cryptographic security of single RSA bits , 1983, STOC '83.

[34]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[35]  Michael Walker,et al.  Key Management for Secure Electronic Funds Transfer in a Retail Environment , 1985, CRYPTO.

[36]  Stafford E. Tavares,et al.  A Layered Broadcast Cryptographic System , 1984, CRYPTO 1984.

[37]  Oded Goldreich,et al.  RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure , 1985, CRYPTO.

[38]  Donald E. Knuth,et al.  Deciphering a linear congruential encryption , 1985, IEEE Trans. Inf. Theory.

[39]  " Cryptography : A New Dimension in Computer Data , 2022 .