1997
DOI: 10.1007/bfb0052239
|View full text |Cite
|
Sign up to set email alerts
|

On the security of the KMOV public key cryptosystem

Abstract: Abstract. This paper analyzes the KMOV public key cryptosystem, which is an elliptic curve based analogue to RSA. It was believed that this cryptosystem is more secure against attacks without factoring such as the Hs in broadcast application. Some new attacks on KMOV are presented in this paper that show the converse. In particular, it is shown that some attacks on RSA which work only when a small public exponent e is used can be extended to KMOV, but with no restriction on e. The implication of these attacks … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2000
2000
2002
2002

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 21 publications
(13 citation statements)
references
References 18 publications
0
13
0
Order By: Relevance
“…It is still an open problem to state precisely when this can be guaranteed, although all experiments to date suggest this is an accurate heuristic assumption to make when inequality (3) holds. We note that a similar assumption is used in the work of Bleichenbacher [1] and Jutla [8].…”
Section: The Boneh-durfee Attackmentioning
confidence: 94%
See 2 more Smart Citations
“…It is still an open problem to state precisely when this can be guaranteed, although all experiments to date suggest this is an accurate heuristic assumption to make when inequality (3) holds. We note that a similar assumption is used in the work of Bleichenbacher [1] and Jutla [8].…”
Section: The Boneh-durfee Attackmentioning
confidence: 94%
“…More precisely, the scheme is a parametrized version of scheme II: p, k, d and h have respective bit-length p (less than 1 2 log 2 N ), k , d , and log 2 N − p − d . To resist various attacks, the following is required:…”
Section: Scheme (Iii)mentioning
confidence: 99%
See 1 more Smart Citation
“…In fact, many other works (e.g. [1,5,8]) are based on this useful heuristical multivariate approach.…”
Section: Introductionmentioning
confidence: 99%
“…Thus, this method does only work provided that β < 1 3 . Like the methods in [1,3,5,8], our approach is based on Coppersmith's technique [4] in the modular multivariate case. More precisely, we use a modular bivariate polynomial equation with a small root.…”
Section: Introductionmentioning
confidence: 99%