Most existing cryptosystem designs incorporate just one cryptographic assumption, such as factoring or discrete logarithms. These assumptions appear secure today; but, it is possible that efficient algorithms will be developed in the future lo break one or more of these assumptions. It is very unlikely that multiple cryptographic assumptions would simultaneously become easy to solve. Enhancing security is the major objective for cryptosystems based on multiple assumptions. K.S. McCurley proposed the first key distribution system based on two dissimilar assumptions, both of which appear to be hard. In his design, the sizes of the security parameters for these two assumptions are quite different. The modulus to satisfy the proper security requirement for one assumption is too large for the other assumption. The side effects are (1) the public key size is larger than the original Dime-Hellman key distribution scheme; and (2) more computation time is required. In the paper, the authors propose a cryptographic system design based on the two popular assumptions: factoring and discrete logarithms. Breaking this system is computationally infeasible because it requires (1) solving the Dime-Hellman discrete logarithm problem in a subgroup of Z ; , where p = 2p‘ x q’ + 1 and p’, q’ are two large primes, and (2) factoring (p 1)/2 into two large primes, p‘ and q’. Thus, in the proposed system, it is possible to choose the same size of security parameter for these two assumptions and, therefore, to maintain the efficiency of the implementation.
[1]
Kevin S. Mccurley,et al.
The discrete logarithm problem
,
1990
.
[2]
M. Rabin.
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
,
1979
.
[3]
Johan Håstad,et al.
Solving Simultaneous Modular Equations of Low Degree
,
1988,
SIAM J. Comput..
[4]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[5]
Andrew M. Odlyzko,et al.
Discrete Logarithms in Finite Fields and Their Cryptographic Significance
,
1985,
EUROCRYPT.
[6]
Andrew M. Odlyzko,et al.
Computation of discrete logarithms in prime fields
,
1991,
Des. Codes Cryptogr..
[7]
Kenneth H. Rosen.
Elementary Number Theory: And Its Applications
,
2010
.
[8]
Adi Shamir,et al.
A method for obtaining digital signatures and public-key cryptosystems
,
1978,
CACM.
[9]
Kevin S. McCurley,et al.
A key distribution system equivalent to factoring
,
1988,
Journal of Cryptology.
[10]
Ernest F. Brickell,et al.
An interactive identification scheme based on discrete logarithms and factoring
,
1991,
Journal of Cryptology.
[11]
Taher El Gamal.
A public key cryptosystem and a signature scheme based on discrete logarithms
,
1984,
IEEE Trans. Inf. Theory.