Cryptography Reference
In-Depth Information
K 1
K 2
=
r A
K
r B
r A
K
=
r A
r A
K
K
r B
=
r B
This value can then be added to K 3 modulo 2 to determine K :
r B
K 3 = r B
r B
K = K
Consequently, although we use a perfectly secure symmetric encryption sys-
tem (i.e., the one-time pad), the resulting key distribution protocol is completely
insecure.
Shamir's three-pass protocol can be instantiated using modular exponentia-
tion in
Z p . This idea is due to James L. Massey and Jim K. Omura, and hence
the resulting key distribution protocol is sometimes also referred to as the Massey-
Omura protocol . Let A and B be two entities that want to run the Massey-Omura
protocol. A has an encryption exponent e A and a corresponding decryption exponent
d A
( e A ) 1 (mod p
1), and B has an encryption exponent e B and a correspond-
ing decryption exponent d B that is the multiplicative inverse modulo p
1 (i.e.,
( e B ) 1 (mod p
d B
1)). Shamir's three-pass protocol can then be instantiated
with the following values for K 1 , K 2 ,and K 3 :
K e A (mod p )
K 1
( K e A ) e B
K e A e B (mod p )
K 2
(( K e A ) e B ) d A
K 3
(( K e A ) d A ) e B
( K e A d A ) e B
K e B (mod p )
Finally, B can use d B to retrieve K :
( K e B ) d B
K e B d B
K
K (mod p )
Unfortunately, this instantiation of Shamir's three-pass protocol employs mod-
ular exponentiation, and hence there is no immediate advantage related to the use of
an asymmetric encryption system in the first place.
Search WWH ::




Custom Search