Security Analysis of ElGamal Implementations

被引:3
|
作者
El Laz, Mohamad [1 ]
Gregoire, Benjamin [1 ]
Rezk, Tamara [1 ]
机构
[1] Inria Sophia Antipolis Mediterranee, Valbonne, France
关键词
ElGamal; DDH Assumption; Quadratic Residues; Voting Systems; Message Encoding;
D O I
10.5220/0009817103100321
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ElGamal encryption scheme is not only the most extensively used alternative to RSA, but is also almost exclusively used in voting systems as an effective homomorphic encryption scheme. Being easily adaptable to a wide range of cryptographic groups, the ElGamal encryption scheme enjoys homomorphic properties while remaining semantically secure. This is subject to the upholding of the Decisional Diffie-Hellman (DDH) assumption on the chosen group. We analyze 26 libraries that implement the ElGamal encryption scheme and discover that 20 of them are semantically insecure as they do not respect the Decisional Diffie-Hellman (DDH) assumption. From the five libraries that do satisfy the DDH assumption, we identify and compare four different message encoding and decoding techniques.
引用
收藏
页码:310 / 321
页数:12
相关论文
共 50 条
  • [41] A Model-Driven Analysis of Mimblewimble Security Properties and its Protocol Implementations
    Silveira, Adrian
    Betarte, Gustavo
    Cristia, Maximiliano
    Luna, Carlos
    MEMORIA INVESTIGACIONES EN INGENIERIA, 2023, (24): : 129 - 142
  • [42] Security Analysis of Vendor Implementations of the OPC UA Protocol for Industrial Control Systems
    Erba, Alessandro
    Mueller, Anne
    Tippenhauer, Nils Ole
    PROCEEDINGS OF THE 4TH WORKSHOP ON CPS & IOT SECURITY AND PRIVACY, CPSIOTSEC 2022, 2022, : 1 - 13
  • [43] An Implementation Of Elias Delta Code And ElGamal Algorithm In Image Compression And Security
    Rachmawati, Dian
    Budiman, Mohammad Andri
    Saffiera, Cut Amalia
    4TH INTERNATIONAL CONFERENCE ON OPERATIONAL RESEARCH (INTERIOR), 2018, 300
  • [44] Updatable ElGamal Encryption Scheme with Forward and Backward Security for Cloud Storage
    Liu, Zhenhua
    Gong, Jingwan
    Ma, Yuanju
    Niu, Yaxin
    Wang, Baocang
    FRONTIERS IN CYBER SECURITY, FCS 2022, 2022, 1726 : 324 - 345
  • [45] A security hybrid mechanism using fuzzy with adaptive ElGamal approach in cloud
    Kavitha, Ravichandran
    Valarmathi, AngaThevar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (26):
  • [46] Security Testing of Session Initiation Protocol Implementations
    Harris, Ian G.
    Alrahem, Thoulfekar
    Chen, Alex
    DiGiuseppe, Nick
    Gee, Jefferey
    Hsiao, Shang-Pin
    Mattox, Sean
    Park, Taejoon
    Selvaraj, Saravanan
    Tam, Albert
    Carlsson, Marcel
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 91 - 103
  • [47] Does Coupling Affect the Security of Masked Implementations?
    De Cnudde, Thomas
    Bilgin, Begul
    Gierlichs, Benedikt
    Nikov, Ventzislav
    Nikova, Svetla
    Rijmen, Vincent
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN, 2017, 10348 : 1 - 18
  • [48] Hardware Implementations of Pairings at Updated Security Levels
    Lavice, Arthur
    El Mrabet, Nadia
    Berzati, Alexandre
    Rigaud, Jean-Baptiste
    Proy, Julien
    SMART CARD RESEARCH AND ADVANCED APPLICATIONS (CARDIS 2021), 2022, 13173 : 189 - 209
  • [49] Formal verification of security protocol implementations: a survey
    Avalle, Matteo
    Pironti, Alfredo
    Sisto, Riccardo
    FORMAL ASPECTS OF COMPUTING, 2014, 26 (01) : 99 - 123
  • [50] Formal security policy implementations in network firewalls
    Macfarlane, Richard
    Buchanan, William
    Ekonomou, Elias
    Uthmani, Omair
    Fan, Lu
    Lo, Owen
    COMPUTERS & SECURITY, 2012, 31 (02) : 253 - 270