Security Analysis of ElGamal Implementations

被引:3
|
作者
El Laz, Mohamad [1 ]
Gregoire, Benjamin [1 ]
Rezk, Tamara [1 ]
机构
[1] Inria Sophia Antipolis Mediterranee, Valbonne, France
关键词
ElGamal; DDH Assumption; Quadratic Residues; Voting Systems; Message Encoding;
D O I
10.5220/0009817103100321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ElGamal encryption scheme is not only the most extensively used alternative to RSA, but is also almost exclusively used in voting systems as an effective homomorphic encryption scheme. Being easily adaptable to a wide range of cryptographic groups, the ElGamal encryption scheme enjoys homomorphic properties while remaining semantically secure. This is subject to the upholding of the Decisional Diffie-Hellman (DDH) assumption on the chosen group. We analyze 26 libraries that implement the ElGamal encryption scheme and discover that 20 of them are semantically insecure as they do not respect the Decisional Diffie-Hellman (DDH) assumption. From the five libraries that do satisfy the DDH assumption, we identify and compare four different message encoding and decoding techniques.
引用
收藏
页码:310 / 321
页数:12
相关论文
共 50 条
  • [1] On the (In)Security of ElGamal in OpenPGP
    De Feo, Luca
    Poettering, Bertram
    Sorniotti, Alessandro
    CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2066 - 2080
  • [2] On the (In)Security of ElGamal in OpenPGP
    De Feo, Luca
    Poettering, Bertram
    Sorniotti, Alessandro
    COMMUNICATIONS OF THE ACM, 2023, 66 (06) : 107 - 115
  • [3] Security Analysis of Smart Home Implementations
    Mahadewa, Kulani
    FORMAL METHODS AND SOFTWARE ENGINEERING, ICFEM 2018, 2018, 11232 : 450 - 454
  • [4] Security Analysis on InfiniBand Protocol Implementations
    Subedi, Kul Prasad
    Dasgupta, Dipankar
    Chen, Bo
    PROCEEDINGS OF 2016 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2016,
  • [5] On the CCA1-Security of Elgamal and Damgard's Elgamal
    Lipmaa, Helger
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 18 - 35
  • [6] Program Analysis of Cryptographic Implementations for Security
    Rahaman, Sazzadur
    Yao, Danfeng
    2017 IEEE CYBERSECURITY DEVELOPMENT (SECDEV), 2017, : 61 - 68
  • [7] Security of signed ElGamal encryption
    Schnorr, CP
    Jakobsson, M
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 73 - 89
  • [8] Security analysis of network access control implementations
    Cetin, F.
    Dagonnier, T.
    Oechslin, P.
    RELIABILITY, RISK AND SAFETY: THEORY AND APPLICATIONS VOLS 1-3, 2010, : 1907 - 1914
  • [9] On the Security of a Variant of ElGamal Encryption Scheme
    Rao, Fang-Yu
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 16 (04) : 725 - 728
  • [10] ENHANCING THE SECURITY OF ELGAMAL SIGNATURE SCHEME
    HE, J
    KIESLER, T
    IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (04): : 249 - 252