On the use of RSA as a secret key cryptosystem

被引:6
|
作者
Brincat, K [1 ]
机构
[1] Univ London, Dept Math, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
unidirectional keys; modular exponentiation; RSA;
D O I
10.1023/A:1008354524654
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One fundamental difference between the use of symmetric and public key cryptosystems is that the former requires trust between sender and receiver. Typically they will share a secret key and neither has any protection from the other. However, many users are now finding that they want keys to be used for 'one purpose only' and are relying on hardware functionality to introduce the concept of unidirectional keys for symmetric algorithms. (So, for instance, the hardware functionality might ensure that a key used for encrypting messages from user A to user B cannot be used for encrypting messages in the opposite direction.) For public key systems this concept of unidirectional keys is automatically satisfied. However, when the encrypting key is made public, the exposure of this key means that the deciphering key is only safe from compromise when the keys are very large. If, on the other hand, both keys were kept secret then it might be possible to use much smaller keys. In this paper we investigate ways of using the primitives of an RSA public key cryptosystem in a symmetric key 'setting' i.e. where neither key is made public.
引用
收藏
页码:317 / 329
页数:13
相关论文
共 50 条
  • [1] On the Use of RSA as a Secret Key Cryptosystem
    Karl Brincat
    Designs, Codes and Cryptography, 2001, 22 : 317 - 329
  • [2] The RSA public key cryptosystem
    Wardlaw, WP
    CODING THEORY AND CRYPTOGRAPHY: FROM ENIGMA AND GEHEIMSCHREIBER TO QUANTUM THEORY, 2000, : 101 - 123
  • [3] A systolic RSA public key cryptosystem
    Chen, PS
    Hwang, SA
    Wu, CW
    ISCAS 96: 1996 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS - CIRCUITS AND SYSTEMS CONNECTING THE WORLD, VOL 4, 1996, : 408 - 411
  • [4] A key escrow system of the RSA cryptosystem
    Sameshima, Y
    INFORMATION SECURITY, 1998, 1396 : 135 - 146
  • [5] A Fast and Secure RSA Public Key Cryptosystem
    Mohammadi, M.
    Zolghadrasli, A.
    Pourmina, M. A.
    JOURNAL OF MATHEMATICAL EXTENSION, 2020, 14 (04) : 1 - 20
  • [6] Implicit-Key Attack on the RSA Cryptosystem
    Zheng, Mengce
    Hu, Honggang
    SCIENCE OF CYBER SECURITY, SCISEC 2019, 2019, 11933 : 354 - 362
  • [7] NEW KEY GENERATION ALGORITHM FOR RSA CRYPTOSYSTEM
    SAKAI, R
    MORII, M
    KASAHARA, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) : 89 - 97
  • [8] MASTER KEY FOR THE RSA PUBLIC-KEY CRYPTOSYSTEM.
    Koyama, Kenji
    Systems, computers, controls, 1982, 13 (01): : 63 - 72
  • [9] Design and implementation of an RSA public-key cryptosystem
    Guo, JH
    Wang, CL
    Hu, HC
    ISCAS '99: PROCEEDINGS OF THE 1999 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 1: VLSI, 1999, : 504 - 507
  • [10] Architecture Optimizations for the RSA Public Key Cryptosystem: A Tutorial
    Cohen, Aaron E.
    Parhi, Keshab K.
    IEEE CIRCUITS AND SYSTEMS MAGAZINE, 2011, 11 (04) : 24 - 34