[prev in list] [next in list] [prev in thread] [next in thread] 

List:       cryptography
Subject:    Re: ElGamal without exponent reduction?
From:       Bodo_Moeller () public ! uni-hamburg ! de (Bodo Moeller)
Date:       1999-06-24 19:40:16
[Download RAW message or body]

Safuat Hamdy <hamdy@cdc.Informatik.TU-Darmstadt.DE>:

> 	G: generator
> 	a: secret value
> 	A: public value G^a
> 
> and for the signature
> 
> 	k: secret random value
> 	R: G^k
> and
> 	s = a h(m) + k g(R)  mod n		(*)
> 
> where h is a hash-function, n is the group order, and g is a (public)
> mapping from the elements of the group to Z (the integers).  The signature
> is (s, R).
> 
> For the verification, check that
> 	G^s = A^h(m) R^g(R)
> holds.
> 
> Now suppose that the reduction  mod n in (*) is omitted.  Except that the
> size of s would be larger, can anybody see whether this would be harmful?

Each signature provides the attacker with an equation

     s_i  =  a * h_i  +  k_i * g_i

where  s_i, k_i,  and  g_i  are known.  At first sight, the number of
equations  k  will always be less than the number of unknowns
(a, h_1, ..., h_k),  but the attacker can reduce each equation modulo
g_i,  or modulo some factor  f_i  thereof, giving

     s_i  =  a * h_i   mod  f_i,

and thus (if  f_i  can be so chosen as to make  h_i  invertible)

     a  =  s_i / h_i   mod  f_i.

Obtain enough samples, use the Chinese Remainder Theorem, and you
have  a.

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic