Cryptography Reference
In-Depth Information
9
Public-Key Cryptography
Content
Diffie-Hellman:
asymmetric cryptography, the DH key agreement protocol
Knapsack problems:
NP-completeness, the Merkle-Hellman cryptosystem
RSA:
the cryptosystem, attacks against particular implementations
ElGamal Encryption
Interestingly, cryptography was the first application of computer science: after
Alan Turing
created the notion of Turing machine, the very first computer was built
in order to break real-life cryptosystems for military purposes. Similarly, the in-
vention of complexity theory—in particular the notion of intractability through NP-
completeness—has been directly applied to cryptography in order to invent
asymmetric
cryptography
, also called
public-key cryptography
.
This chapter relates to the early foundations of asymmetric cryptography, and
modern applications (and attacks).
9.1
Diffie-Hellman
Invention of public-key cryptography is often attributed to Whitfield Diffie and Martin
Hellman: in a famous paper (Ref. [59]) which was published in the
IEEE Transactions
on Information Theory
journal in 1976, they gave “new directions in cryptography,”
describing how we can use
one-way functions
, and notions of
trapdoor permutations
in
cryptography. A public-key cryptosystem is nothing but a kind of one-way permutation
(anybody can encrypt, but cannot decrypt) with a hidden trapdoor which enables the
decryption to the legitimate party.
Although this seminal paper played an outstanding role in the area of cryptography,
the role of
Ralph Merkle
in the foundations should not be neglected. Merkle submitted
his scheme in 1975
1
(discussed in p. 115) which enables the secure communication
over an insecure channel. The Merkle Signature Scheme based on hash trees was also
made in the late seventies
2
. The Lamport scheme which is given on p. 111 (published
in 1979; see Ref. [113]) also illustrates how to make an asymmetric access control
protocol from a one-way function.
1
But it was published in 1978 only! See Ref. [129].
2
But it was rejected for publication, and then published 10 years later. See Ref. [131].
Search WWH ::
Custom Search