Public-key cryptography. State of the art and future directions. E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991. Final report (Q1202030)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Public-key cryptography. State of the art and future directions. E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991. Final report |
scientific article; zbMATH DE number 108052
| Language | Label | Description | Also known as |
|---|---|---|---|
| English | Public-key cryptography. State of the art and future directions. E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991. Final report |
scientific article; zbMATH DE number 108052 |
Statements
Public-key cryptography. State of the art and future directions. E.I.S.S. workshop, Oberwolfach, Germany, July 3-6, 1991. Final report (English)
0 references
23 January 1993
0 references
This report is the result of a meeting of leading experts in the field of public-key cryptography. Although the presentation is aimed at researchers in the field as well as users of security technology, it is also accessible to non-specialists. Public-key cryptography is based on the existence of one-way functions, i.e. bijections \(\Phi\) which allow efficient computation but for which inversion \(\Phi^{-1}\) is considered computationally intractable. A prominent instance is the discrete logarithm problem; i.e. given an arbitrary element \(X\) from a cyclic group \(G\) of order \(| G|\) generated by a primitive element \(\omega\), find the unique integer \(x\in[0,| G|-1]\) with \(X=\omega^ x\). Usually \(G\) is taken to be the multiplicative group of a finite field but recently also the group of an elliptic curve over a finite field has been studied in view of the discrete logarithm problem. If this problem may be considered hard in the underlying group, exponentiation (or multiplication, depending on notation of the group law) is used to implement the Diffie-Hellman key exchange protocol in order to provide one-key cryptosystems with a key. Two-key systems are essentially one-way systems if considered by outsiders, while insiders can use the inherent trapdoor to invert the bijection \(\Phi\) in an effective way. An important instance of this case is the RSA cryptosystem. Both, the Diffie-Hellman key exchange and the RSA cryptosystem are based on the assumption that the system is secure if a problem in computational number theory is considered hard. In the two cases these are the discrete logarithm problem and the factorisation problem of (large) integers, respectively. Therefore a considerable part of the report is devoted to a survey of recent research in computational number theory. Various attacks on public-key cryptosystems are not directly based on number theory but on weaknesses due to protocol failures or inappropriate applications in a certain environment. As an alternative to the traditional way of designing cryptosystems, based on heuristics and the experience of the designer, a formal approach to cryptosystem design and analysis is outlined. Public-key cryptography will have to satisfy an increasing number of needs. Therefore an impressive list of tasks and a careful distinction between all the requirements is given. This may be a good guideline for future research in cryptography. In view of all these considerations, design criteria for a RSA chip are given which necessarily depend on the application. The report concludes with statements and predictions about the choice of parameters in implementations with respect to long lasting security.
0 references
Oberwolfach (Germany)
0 references
Workshop
0 references
Public-key Cryptography
0 references
factorization
0 references
two-key system
0 references
public-key cryptography
0 references
security technology
0 references
one-way functions
0 references
discrete logarithm problem
0 references
elliptic curve
0 references
finite field
0 references
Diffie-Hellman key exchange protocol
0 references
RSA cryptosystem
0 references
computational number theory
0 references
attacks
0 references
cryptosystem design
0 references