Rabin cryptosystem

The Rabin cryptosystem is a family of public-key encryption schemes based on a trapdoor function whose security, like that of RSA, is related to the difficulty of integer factorization.[1][2]

The Rabin trapdoor function has the advantage that inverting it has been mathematically proven to be as hard as factoring integers, while there is no such proof known for the RSA trapdoor function. It has the disadvantage that each output of the Rabin function can be generated by any of four possible inputs; if each output is a ciphertext, extra complexity is required on decryption to identify which of the four possible inputs was the true plaintext. Naive attempts to work around this often either enable a chosen-ciphertext attack to recover the secret key or, by encoding redundancy in the plaintext space, invalidate the proof of security relative to factoring.[1]

Public-key encryption schemes based on the Rabin trapdoor function are used mainly for examples in textbooks. In contrast, RSA is the basis of standard public-key encryption schemes such as RSAES-PKCS1-v1_5 and RSAES-OAEP that are used widely in practice.

History

The Rabin trapdoor function was first published as part of the Rabin signature scheme in 1978 by Michael O. Rabin.[3][4][5] The Rabin signature scheme was the first digital signature scheme where forging a signature could be proven to be as hard as factoring.

The trapdoor function was later repurposed in textbooks as an example of a public-key encryption scheme,[6][7][1] which came to be known as the Rabin cryptosystem even though Rabin never published it as an encryption scheme.

Encryption Algorithm

Like all asymmetric cryptosystems, the Rabin system uses a key pair: a public key for encryption and a private key for decryption. The public key is published for anyone to use, while the private key remains known only to the recipient of the message.

Key generation

The keys for the Rabin cryptosystem are generated as follows:

  1. Choose two large distinct prime numbers and such that and .
  2. Compute .

Then is the public key and the pair is the private key.

Encryption

A message can be encrypted by first converting it to a number using a reversible mapping, then computing . The ciphertext is .

Decryption

The message can be recovered from the ciphertext by taking its square root modulo as follows.

  1. Compute the square root of modulo and using these formulas:
  2. Use the extended Euclidean algorithm to find and such that .
  3. Use the Chinese remainder theorem to find the four square roots of modulo :

One of these four values is the original plaintext , although which of the four is the correct one cannot be determined without additional information.

Computing square roots

We can show that the formulas in step 1 above actually produce the square roots of as follows. For the first formula, we want to prove that . Since the exponent is an integer. The proof is trivial if , so we may assume that does not divide . Note that implies that , so c is a quadratic residue modulo . Then

The last step is justified by Euler's criterion.

Example

As an example, take and , then . Take as our plaintext. The ciphertext is thus .

Decryption proceeds as follows:

  1. Compute and .
  2. Use the extended Euclidean algorithm to compute and . We can confirm that .
  3. Compute the four plaintext candidates:

and we see that is the desired plaintext. Note that all four candidates are square roots of 15 mod 77. That is, for each candidate, , so each encrypts to the same value, 15.

Digital Signature Algorithm

The Rabin cryptosystem can be used to create and verify digital signatures. Creating a signature requires the private key . Verifying a signature requires the public key .

Signing

A message can be signed with a private key as follows.

  1. Generate a random value .
  2. Use a cryptographic hash function to compute , where the double-bar denotes concatenation. should be an integer less than .
  3. Find a square root of using the private key . This will produce the usual four results, .
  4. One might expect that squaring each would produce . However, this will be true only if happens to be a quadratic residue modulo and . To determine if this is the case, square . If this does not yield , repeat this algorithm with a new random . The expected number of times this algorithm needs to be repeated before finding a suitable is 4.
  5. Having found a square root of , the signature is .

Verifying a signature

A signature for a message can be verified using the public key as follows.

  1. Compute .
  2. Compute
  3. The signature is valid if and a forgery otherwise.

Evaluation of the algorithm

Effectiveness

Decrypting produces three false results in addition to the correct one, so that the correct result must be guessed. This is the major disadvantage of the Rabin cryptosystem and one of the factors which have prevented it from finding widespread practical use.

If the plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is intended to represent a numerical value, this issue becomes a problem that must be resolved by some kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add padding, to eliminate this problem. A way of removing the ambiguity of inversion was suggested by Blum and Williams: the two primes used are restricted to primes congruent to 3 modulo 4 and the domain of the squaring is restricted to the set of quadratic residues. These restrictions make the squaring function into a trapdoor permutation, eliminating the ambiguity.[8]

Efficiency

For encryption, a square modulo n must be calculated. This is more efficient than RSA, which requires the calculation of at least a cube.

For decryption, the Chinese remainder theorem is applied, along with two modular exponentiations. Here the efficiency is comparable to RSA.

Security

It has been proven that any algorithm which finds one of the possible plaintexts for every Rabin-encrypted ciphertext can be used to factor the modulus . Thus, Rabin decryption for random plaintext is at least as hard as the integer factorization problem, something that has not been proven for RSA. It is generally believed that there is no polynomial-time algorithm for factoring, which implies that there is no efficient algorithm for decrypting a random Rabin-encrypted value without the private key .

The Rabin cryptosystem does not provide indistinguishability against chosen plaintext attacks since the process of encryption is deterministic. An adversary, given a ciphertext and a candidate message, can easily determine whether or not the ciphertext encodes the candidate message (by simply checking whether encrypting the candidate message yields the given ciphertext).

The Rabin cryptosystem is insecure against a chosen ciphertext attack (even when challenge messages are chosen uniformly at random from the message space).[6]: 214  By adding redundancies, for example, the repetition of the last 64 bits, the system can be made to produce a single root. This thwarts this specific chosen-ciphertext attack, since the decryption algorithm then only produces the root that the attacker already knows. If this technique is applied, the proof of the equivalence with the factorization problem fails, so it is uncertain as of 2004 if this variant is secure. The Handbook of Applied Cryptography by Menezes, Oorschot and Vanstone considers this equivalence probable, however, as long as the finding of the roots remains a two-part process (1. roots and and 2. application of the Chinese remainder theorem).

See also

Notes

  1. ^ a b c Galbraith, Steven D. (2012). "§24.2: The textbook Rabin cryptosystem". Mathematics of Public Key Cryptography. Cambridge University Press. pp. 491–494. ISBN 978-1-10701392-6.
  2. ^ Bellare, Mihir; Goldwasser, Shafi (July 2008). "§2.3.4 The Squaring Trapdoor Function Candidate by Rabin". Lecture Notes on Cryptography (PDF). pp. 29–32.
  3. ^ Rabin, Michael O. (1978). "Digitalized Signatures". In DeMillo, Richard A.; Dobkin, David P.; Jones, Anita K.; Lipton, Richard J. (eds.). Foundations of Secure Computation. New York: Academic Press. pp. 155–168. ISBN 0-12-210350-5.
  4. ^ Rabin, Michael O. (January 1979). Digitalized Signatures and Public Key Functions as Intractable as Factorization (PDF) (Technical report). Cambridge, MA, United States: MIT Laboratory for Computer Science. TR-212.
  5. ^ Bellare, Mihir; Rogaway, Phillip (May 1996). Maurer, Ueli (ed.). The Exact Security of Digital Signatures—How to Sign with RSA and Rabin. Advances in Cryptology – EUROCRYPT ’96. Lecture Notes in Computer Science. Vol. 1070. Saragossa, Spain: Springer. pp. 399–416. doi:10.1007/3-540-68339-9_34. ISBN 978-3-540-61186-8.
  6. ^ a b Stinson, Douglas (2006). "5.8". Cryptography: Theory and Practice (3rd ed.). Chapman & Hall/CRC. pp. 211–214. ISBN 978-1-58488-508-5.
  7. ^ Menezes, Alfred J.; van Oorschot, Paul C.; Vanstone, Scott A. (October 1996). "§8.3: Rabin public-key encryption". Handbook of Applied Cryptography (PDF). CRC Press. pp. 292–294. ISBN 0-8493-8523-7.
  8. ^ Bellare, Mihir; Goldwasser, Shafi (July 2008). "§2.3.5 A Squaring Permutation as Hard to Invert as Factoring". Lecture Notes on Cryptography (PDF). pp. 32–33.

References

  • Buchmann, Johannes. Einführung in die Kryptographie. Second Edition. Berlin: Springer, 2001. ISBN 3-540-41283-2
  • Menezes, Alfred; van Oorschot, Paul C.; and Vanstone, Scott A. Handbook of Applied Cryptography. CRC Press, October 1996. ISBN 0-8493-8523-7
  • Rabin, Michael. Digitalized Signatures and Public-Key Functions as Intractable as Factorization (in PDF). MIT Laboratory for Computer Science, January 1979.
  • Scott Lindhurst, An analysis of Shank's algorithm for computing square roots in finite fields. in R Gupta and K S Williams, Proc 5th Conf Can Nr Theo Assoc, 1999, vol 19 CRM Proc & Lec Notes, AMS, Aug 1999.
  • R Kumanduri and C Romero, Number Theory w/ Computer Applications, Alg 9.2.9, Prentice Hall, 1997. A probabilistic for square root of a quadratic residue modulo a prime.

Read other articles:

PlayerPoster promosiHangul플레이어 GenreLagaKejahatanPembuatStudio Dragon[1]Ditulis olehShin Jae-hyungSutradaraGo Jae-hyunPemeranSong Seung-heonKrystal JungLee Si-eonTae Won-suk [ko]Negara asalKorea SelatanBahasa asliKoreaJmlh. episode14ProduksiProduser eksekutifJinnie ChoiDurasi60 menitRumah produksiiWill Media[1]DistributorOCNRilis asliJaringanOCNFormat gambar1080i (HDTV)Format audioDolby DigitalRilis29 September (2018-09-29) –11 November 2018 …

Dolok Sphyraena flavicauda Juveniles schooling, DahabTaksonomiKerajaanAnimaliaFilumChordataKelasActinopteriOrdoPerciformesFamiliSphyraenidaeGenusSphyraenaSpesiesSphyraena flavicauda Rüppell, 1838 Tata namaSinonim takson Sphyraena langsar (Rüppell, 1838) Sphyraenella flavicauda Bleeker, 1855[1] lbs Dolok ( Sphyraena flavicauda ) adalah spesies ikan barakuda berukuran kecil yang dapat ditemukan di lautan Indo-Pasifik Barat . Ia juga menginvasi Mediterania melalui Terusan Suez dari Laut M…

Crazy in LoveSingle by Kim Carnesfrom the album View from the House B-sideBlood from the BanditReleased1988Recorded1988Sound Stage Studios(Nashville, Tennessee)Length3:52LabelMCASongwriter(s)Randy McCormickEven StevensProducer(s)Jimmy BowenKim CarnesKim Carnes singles chronology Speed of the Sound of Loneliness (1988) Crazy in Love (1988) Just to Spend Tonight with You (1988) Crazy in LoveSingle by Conway Twittyfrom the album Crazy in Love B-sideHeart's Breakin' All Over TownReleasedAugust 1990G…

Federasi Sepak Bola KomoroCAFDidirikan1979Kantor pusatMoroniBergabung dengan FIFA2005[1]Bergabung dengan CAF2003[2]PresidenMariyatta AbdouWebsitehttps://www.fedcomfoot.com Berkas:Comoros.pngLogo lama Federasi Sepak Bola Komoro. Federasi Sepak Bola Komoro (Prancis: Fédération de Football des Comores (CFF)code: fr is deprecated ) adalah badan pengendali sepak bola di Komoro. Tim nasional Badan ini merupakan badan pengendali dari tim nasional pria Komoro. Referensi ^ BBC SPORT …

مسجد عيد غاMasjid Id KahÀi Tí Gǎ ĚrAgamaAfiliasiIslamWilayahXinjiangLokasiLokasiKashgar, Xinjiang, ChinaKoordinat39°28′20″N 75°59′03″E / 39.47227°N 75.984106°E / 39.47227; 75.984106Koordinat: 39°28′20″N 75°59′03″E / 39.47227°N 75.984106°E / 39.47227; 75.984106ArsitekturArsitekSaqsiz MirzaTipeMasjidRampung1442SpesifikasiKapasitas20,000Menara3 Masjid Id Kah (Uighur: ھېيتگاھ مەسچىتىcode: ug is depreca…

Discontinued shooting target mannequin The Ex after it was hit using Macho Gaucho rounds (a type of 12-gauge shell) from a distance of five yards The Ex, also known as the Ex-Girlfriend, and now renamed to Alexa Zombie, is a discontinued mannequin produced by Zombie Industries as a shooting target.[1] The mannequin's name, and the fact that it spouted blood when shot, caused controversy. The target received attention after the National Rifle Association of America requested that Zombie I…

Slovenian football referee Damir Skomina Skomina officiating a 2018 World Cup matchFull name Damir SkominaBorn (1976-08-05) 5 August 1976 (age 47)Koper, SR Slovenia, SFR Yugoslavia[1]DomesticYears League Role Slovenian PrvaLiga RefereeInternationalYears League Role2003–2021 FIFA listed Referee Damir Skomina (born 5 August 1976) is a Slovenian former UEFA Elite category football referee. Refereeing career Skomina was the fourth referee at several UEFA Euro 2008 matches.[2&…

Dewan Perwakilan Rakyat Daerah Kabupaten PringsewuDewan Perwakilan RakyatKabupaten Pringsewu2019-2024JenisJenisUnikameral SejarahSesi baru dimulai19 Agustus 2019PimpinanKetuaSuherman (Golkar) sejak 9 Oktober 2019 Wakil Ketua IHj. Mastuah, A.Md.Kep. (PKB) sejak 9 Oktober 2019 Wakil Ketua IIYurizal (PDI-P) sejak 14 Oktober 2022 KomposisiAnggota40Partai & kursi  PDI-P (5)   NasDem (2)   PKB (6)   Demokrat (4)   PAN (5)   Go…

سارت    علم شعار الاسم الرسمي (بالفرنسية: Sarthe)‏    الإحداثيات 48°17′00″N 0°13′00″E / 48.283333333333°N 0.21666666666667°E / 48.283333333333; 0.21666666666667  [1] تاريخ التأسيس 4 مارس 1790  سبب التسمية نهر سارت  تقسيم إداري  البلد فرنسا[2][3]  التقسيم الأعلى بايي دو لا …

Júnior Baiano Nazionalità  Brasile Altezza 192 cm Peso 91 kg Calcio Ruolo Allenatore (ex difensore) Termine carriera 2009 - giocatore Carriera Squadre di club1 1988-1993 Flamengo40 (2)1994-1995 San Paolo17 (6)1995-1996 Werder Brema32 (2)1996-1998 Flamengo31 (6)1998-1999 Palmeiras22 (6)2000-2001 Vasco da Gama21 (1)2001-2002 Shanghai Shenhua5 (0)2002-2004 Internacional3 (0)2004-2005 Flamengo42 (8)2007 America-RJ0 (0)2007-2008 Brasiliens…

Strada statale 651di PescolancianoDenominazioni precedentiStrada statale 85 Venafrana Denominazioni successiveStrada provinciale 78 Aquilonia LocalizzazioneStato Italia Regioni Molise Province Isernia DatiClassificazioneStrada statale InizioSS 650 presso Pescolanciano Fineex SS 86 presso Carovilli Lunghezza7,270[1] km Provvedimento di istituzioneD.M. del 29/12/1987 - G.U. 20 del 26/01/1988[2] GestoreANAS (1988-2001) Percorso Manuale La ex strada statale 651 di Pesc…

District of Azerbaijan 39°38′0″N 46°33′0″E / 39.63333°N 46.55000°E / 39.63333; 46.55000 District in East Zangezur, AzerbaijanLachin DistrictDistrictMap of Azerbaijan showing Lachin DistrictCountry AzerbaijanRegionEast ZangezurEstablished8 August 1930CapitalLachinSettlements[1]127Government • GovernorAgil NazarliArea • Total1,840 km2 (710 sq mi)Population (2020)[2] • Total78,600 …

You can help expand this article with text translated from the corresponding article in German. (November 2016) Click [show] for important translation instructions. View a machine-translated version of the German article. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedi…

11th Prime Minister of India from 1996 to 1997 (born 1933) H. D. Deve GowdaGowda in 201511th Prime Minister of India[1]In office1 June 1996 – 21 April 1997PresidentShankar Dayal SharmaPreceded byAtal Bihari VajpayeeSucceeded byInder Kumar GujralPresident of Janata Dal (Secular)IncumbentAssumed office July 1999Preceded byPosition EstablishedMember of Parliament, Rajya SabhaIncumbentAssumed office 26 June 2020Preceded byD. Kupendra ReddyConstituencyKarnatakaIn office23 S…

Akurasi menunjukkan kedekatan hasil pengukuran dengan nilai sesungguhnya, presisi menunjukkan seberapa dekat perbedaan nilai pada saat dilakukan pengulangan pengukuran. Dalam bidang ilmu pengetahuan, industri rekayasa, dan statistik, akurasi[1] dari suatu sistem pengukuran adalah tingkat kedekatan pengukuran kuantitas terhadap nilai yang sebenarnya. Kepresisian dari suatu sistem pengukuran, disebut juga reproduktifitas (bahasa Inggris: reproducibility) atau pengulangan (bahasa Inggri…

Former administrative division of Thailand Si Rat Malaiสี่รัฐมาลัยSubdivision of Thailand1943–1945 Flag  Thai occupation zones (Si Rat Malai)   Japanese occupation zonesCapitalAlor SetarArea • 194338,382 km2 (14,819 sq mi)Historical eraWorld War II• Japan hands over the four states to Thailand 18 October 1943• Thailand returns annexed territories to the United Kingdom 2 September 1945 Preceded by Succeeded by Ja…

Artikel ini perlu diwikifikasi agar memenuhi standar kualitas Wikipedia. Anda dapat memberikan bantuan berupa penambahan pranala dalam, atau dengan merapikan tata letak dari artikel ini. Untuk keterangan lebih lanjut, klik [tampil] di bagian kanan. Mengganti markah HTML dengan markah wiki bila dimungkinkan. Tambahkan pranala wiki. Bila dirasa perlu, buatlah pautan ke artikel wiki lainnya dengan cara menambahkan [[ dan ]] pada kata yang bersangkutan (lihat WP:LINK untuk keterangan lebih lanjut). …

Bumbu Bumbu CintaGenre Drama Roman PembuatMD EntertainmentDitulis olehSabrina FirdausSkenarioSabrina FirdausSutradaraAi ManafPemeran Thalita Latief Dimaz Andrean Rezky Aditya Unang Bagito Roweina Umboh Rommy Sulastyo Penggubah lagu temaThe TitansLagu pembukaSeandainya oleh The TitansLagu penutupSeandainya oleh The TitansPenata musik Anton BHS Dicky AJ Negara asalIndonesiaBahasa asliBahasa IndonesiaJmlh. musim1Jmlh. episode7 (daftar episode)ProduksiProduser eksekutifShania PunjabiProduser D…

Artikel ini bukan mengenai Serbuk pisang. Pisang mentah, bahan baku untuk membuat tepung pisang Tepung pisang adalah bubuk yang secara tradisional dibuat dari pisang mentah. Dahulunya, tepung pisang digunakan di Afrika dan Jamaika sebagai alternatif tepung terigu yang lebih murah.[1] Kini tepung pisang sering digunakan sebagai pengganti tepung terigu yang bebas gluten[2] atau sebagai sumber pati resistan, yang dipromosikan dalam tren diet tertentu seperti diet paleo dan primal, s…

1937 filmPorky's RailroadDirected byFrank TashlinProduced byLeon SchlesingerStarringMel BlancBilly BletcherMusic byCarl W. StallingAnimation byJoe D'IgaloRobert BentleyColor processBlack and WhiteProductioncompanyLeon Schlesinger ProductionsDistributed byWarner Bros. PicturesRelease date August 7, 1937 (1937-08-07) Running time7:14LanguageEnglish Porky's Railroad is a Warner Bros. Looney Tunes cartoon directed by Frank Tashlin.[1] The short was released on August 7, 1937, …

Kembali kehalaman sebelumnya