Số nguyên tố an toàn trong các giao thức DH-KE
DOI:
https://doi.org/10.54654/isj.v1i11.97Keywords:
Safe prime generation algorithm, DH-KE protocolTóm tắt
Tóm tắt—Việc sinh các số nguyên tố “an toàn” p, mà ở đó tất cả các ước nguyên tố khác 2 của p-1 đều là ước nguyên tố lớn, là hết sức cần thiết để tránh các tấn công nhóm con nhỏ được chỉ ra bởi hai tác giả Chao Hoom Lim và Pil Joong Lee. Một thuật toán hiện có để sinh các số nguyên tố như vậy cũng đã được trình bày bởi hai tác giả này. Tuy nhiên, hạn chế của phương pháp đó là thuật toán không phải khi nào cũng trả về được một số nguyên tố an toàn. Một phần lý do cho vấn đề này là vì thuật toán không (và khó có thể) được phân tích và đánh giá kỹ lưỡng về mặt toán học. Do đó, mục đích chính của bài báo là đề xuất một thuật toán mới để sinh các số nguyên tố an toàn và kèm theo các đánh giá chi tiết về mặt toán học.
Abstract—The generate of “safe” primes p, where all prime divisors of p-1 are large prime divisors, is essential to avoid small subgroup attacks which are point out by two authors Chao Hoom Lim and Pil Joong Lee. An existing algorithm for generating such primes has also been presented by these two authors. However, the drawback of that method is that the algorithm does not always return safe prime numbers. Part of the reason for this is that the algorithm is not (and hardly) be thoroughly analyzed and evaluated mathematically. Therefore, the main purpose of this paper is to propose a new algorithm for generating safe prime numbers, including detailed mathematical evaluations.
Downloads
References
[1] S. C. Pohlig and M. E. Hellman (1978), An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Trans. Inform. Theory, IT-24 (1), pp.106-110.
[2] C. Lim and P. Lee (1997), A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroup, EUROCRYPT 1997.
[3] J.M.Pollard (1978), Monte Carlo methods for index computation (rood p), Math. Comp., 32(143), pp.918-924.
[4] FIPS PUB 186-3 (2009), Digital Signature Standard (DSS), https://csrc.nist.gov/csrc/media/publications/fips/186/3/archive/2009-06-25/documents/fips_186-3.pdf, Accessed on 10/9/2020.
[5] T. Matsumoto, Y. Takashima and H. Imai (1986), On seeking smart public-key distribution systems, The Transactions of the [EICE of Japan, E69, pp.99-106.
[6] FSF, Gnu privacy guard, http://www.gnupg.org/, Accessed on 10/9/2020.
[7] Gutmann. P, cryptlib, https://www.cs.auckland.ac.nz/~pgut001/cryptlib/, Accessed on 10/9/2020.
[8] PGP. I, OpenPGP, https://www.openpgp.org/, Accessed on 10/9/2020.
[9] MIRACL, MIRACL Cryptographic SDK, https://github.com/miracl/MIRACL, Accessed on 10/9/2020.
[10] Rechard Crandall, Carl Pomerance (2005), Prime Numbers: A Computational Perspetive, Springer, https://www.springer.com/gp/book/9780387252827, Accessed on 10/9/2020.
[11] Nguyễn Quốc Toàn, Đỗ Đại Chí, Triệu Quang Phong (2016), Về một tiêu chuẩn tham số cho bài toán logarithm rời rạc, Nghiên cứu Khoa học và Công nghệ trong lĩnh vực An toàn thông tin, ISSN 2615-9570. No 02. Vol 01. 2016.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).