EATCS Monographs on Theoretical Computer Science

Similar documents
Texts in Theoretical Computer Science An EATCS Series

EATCS Monographs on Theoretical Computer Science

Damage Mechanics with Finite Elements

Ergebnisse der Mathematik und ihrer Grenzgebiete

Formal Concept Analysis

How to Write Technical Reports

Mathematics, Computer Science and Logic - A Never Ending Story

Encyclopedia of Marine Sciences

A Algorithms and Combinatorics 13

Foundations of Mathematics

Zdravko Cvetkovski. Inequalities. Theorems, Techniques and Selected Problems

Paul M. Gauthier. Lectures on Several Complex

The Sound of Silence

Springer-Verlag Berlin Heidelberg GmbH

NEUROANATOMY 3D-Stereoscopic Atlas of the Human Brain

Introduction to the Representation Theory of Algebras

Companion to European Heritage Revivals / edited by Linde Egberts and Koos Bosma

Communicating Science

Collected Papers VI. Literary Reality and Relationships

Phase Equilibria, Crystallographic and Thermodynamic Data of Binary Alloys

Calculation of Demographic Parameters in Tropical Livestock Herds

NMR. Basic Principles and Progress Grundlagen und F ortschritte. Volume 7. Editors: P. Diehl E. Fluck R. Kosfeld. With 56 Figures

Texts in Theoretical Computer Science An EATCS Series

Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W.

Landolt-Börnstein Numerical Data and Functional Relationships in Science and Technology New Series / Editor in Chief: W.

Protecting Chips Against Hold Time Violations Due to Variability

Quantum Theory and Local Causality

Lecture Notes in Computer Science 7020

Landolt-Börnstein / New Series

Multicriteria Optimization

Springer Series in Information Sciences 22

MATLAB Ò and Design Recipes for Earth Sciences

Köhler s Invention Birkhäuser Verlag Basel Boston Berlin

Racial Profiling and the NYPD

Mathematical Principles of Fuzzy Logic

RELIGIOUS LIFE AND ENGLISH CULTURE IN THE REFORMATION

Problem Books in Mathematics

Guide to Computing for Expressive Music Performance

Six Lectures. on Modern Natural Philosophy. c. Truesdell. Springer-Verlag Berlin Heidelberg GmbH 1966

Burkhard Vogel. How to Gain Gain. A Reference Book on Triodes in Audio Pre-Amps

The Discourse of Peer Review

WOMEN'S REPRESENTATIONS OF THE OCCUPATION IN POST-'68 FRANCE

Innovations Lead to Economic Crises

Human Rights Violation in Turkey

Pier re Soille. Morphological Image Analysis

Romanticism and Pragmatism

Ramanujan's Notebooks

Blake and Modern Literature

A Glossary of Anesthesia and Related Terminology. Second Edition

E. Kowalski. Nuclear Electronics. With 337 Figures. Springer-Verlag New York Heidelberg Berlin 1970

A Hybrid Theory of Metaphor

Studies in German Idealism

The Elegies of Ted Hughes

The New Middle Ages. Series Editor Bonnie Wheeler English & Medieval Studies Southern Methodist University Dallas, Texas, USA

Lecture Notes in Mathematics 2164

Theory of Digital Automata

Postnarrativist Philosophy of Historiography

Rasch Models. Foundations, Recent Developments, and Applications

Quality Assurance in Seafood Processing: A Practical Guide

Hardy and the Erotic

Propaganda and Hogarth s Line of Beauty in the First World War

ALLYN YOUNG: THE PERIPATETIC ECONOMIST

illrich Reimers Digital Video Broadcasting (DVB)

Die Grundlehren der mathematischen Wissenschaften

Freshwater Invertebrates in Central Europe

SpringerBriefs in Electrical and Computer Engineering

Existentialism and Romantic Love

Trends in Mathematics

Environmental Impact of Fertilizer on Soil and Water

Urbanization and the Migrant in British Cinema

Defining Literary Criticism

Polymer Technology Dictionary

The Search for Selfhood in Modern Literature

Edible Medicinal and Non-Medicinal Plants

Philosophy of Development

R.S. THOMAS: CONCEDING AN ABSENCE

Studies in Natural Language and Linguistic Theory

HANDBOOK OF RECORDING ENGINEERING

Lattice-Ordered Groups. An Introduction

PERFUMES ART, SCIENCE AND TECHNOLOGY

Injectable Fillers in Aesthetic Medicine

The Grotesque in Contemporary Anglophone Drama

Theatre and Residual Culture

Jane Dowson. Carol Ann Duffy. Poet for Our Times

The Rhetoric of Religious Cults

Cyber Ireland. Text, Image, Culture. Claire Lynch. Brunel University London, UK

The Language of Cosmetics Advertising

The Letter in Flora Tristan s Politics,

Logic and the Limits of Philosophy in Kant and Hegel

Dada and Existentialism

Towards a Poetics of Literary Biography

Cognitive Studies in Literature and Performance

The Philosophy of Friendship

BOSTON STUDIES IN THE PHILOSOPHY OF SCIENCE. VOLUME LlI DIALECTICS OF THE CONCRETE

Appraising Research: Evaluation in Academic Writing

Ancient West Asian Civilization

THEORY AND APPLICATIONS OF SPECIAL FUNCTIONS. A Volume Dedicated to Mizan Rahman

Teaching and the Internet: The Application of Web Apps, Networking, and Online Tech for Chemistry Education

Max Weber and Postmodern Theory

Public Sector Organizations and Cultural Change

Transcription:

EATCS Monographs on Theoretical Computer Science Volume 23 Editors: W. Brauer G. Rozenberg A. Salomaa Advisory Board: G.Ausiello M.Broy S.Even IHartmanis N.Jones T. Leighton M.Nivat C. Papadimitriou D. Scott

Arto Salomaa Public-Key Cryptography With 18 Figures Springer-Verlag Berlin Heidelberg GmbH

Author Prof. Dr. Arto Salomaa The Academy of Finland SF-20500 Turku, Finland Editors Prof. Dr. Wilfried Brauer Institut fur Informatik, Technische Universitat Miinchen Arcisstrasse 21, D-8000 Miinchen 2, FRG Prof. Dr. Grzegorz Rozenberg Institute of Applied Mathematics and Computer Science University of Lei den, Niels-Bohr-Weg 1, P. O. Box 9512 NL-2300 RA Leiden, The Netherlands Prof. Dr. Arto Salomaa (address as above) ISBN 978-3-662-02629-8 Library of Congress Cataloging-in-Publication Data Salomaa, Arto. Public-key cryptography / Arto SaIomaa. p. cm. - (EATCS monographs on theoretical computer science; v. 23) Includes bibliographical references and index. ISBN 978-3-662-02629-8 ISBN 978-3-662-02627-4 (ebook) DOI 10.1007/978-3-662-02627-4 I. Computers - Access control. 2. Cryptography. I. Title. II. Series. QA76.9.A25S26 1990 005.8'2-dc20 90-10092 CIP This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in other ways, and storage in data banks. Duplication of this publication or parts thereof is only permitted under the provisions ofthe German Copyright Law of September 9, 1965, in its current version, and a copyright fee must always be paid. Violations fall under the prosecution act of the German Copyright Law. Springer-Verlag Berlin Heidelberg 1990 Originally published by Springer-Verlag Berlin Heidelberg New York in 1990 Softcover reprint of the hardcover 1 st edition 1990 The use of registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. 2141/3140-543210 - Printed on acid-free paper

To the Memory of My Sister Sirkka Salomaa 1919-1989

Preface Cryptography, secret writing, is probably as old as writing in general. Only recently it has become the object of extensive scientific studies. Vast new applications to data security constitute one explanation for this. Perhaps a still more important reason for the huge growth of scientific research on cryptography is the seminal idea of public-key cryptography and the resulting new vistas on the possibilities of communication. This book presents a view on public-key cryptography with classical cryptography as the starting point. An attempt has been made to cover some of the most recent developments and present novel features. The plaintext examples constitute a package of basic sauna knowledge. Acknowledgements. Hermann Maurer revived in the late 70's my dormant interest in cryptography. I have used some versions of this book since 1983 for courses on cryptography at the Universities of Turku and Leiden, as well as at the Technical University of Wien. The observations of the participants in these courses were useful. Juha Honkala, Jarkko Kari, Valtteri Niemi, Lila Santean, Mika Niemi and Ari Renvall have commented on various parts of the manuscripts, and the first four have contributed in numerous discussions as well. I have also benefited from discussions with Ron Book, Wilfried Brauer. Karel Culik, Ferenc Gecseg, Jozef Gruska, Tero Harju, liro Honkala, Helmut Jurgensen, Juhani Karhumiiki, Werner Kuich, Hannu Nurmi, Kaisa Nyberg, Azaria Paz, Grzegorz Rozenberg, Kai Salomaa, Aimo Tietiiviiinen, Emo Welzl, Derick Wood and Sheng Yu. Special thanks are due to Elisa Mikkola for excellent typing, as well as assistance in many practical matters. Anu Heinimiiki has drawn the pictures. The Academy of Finland has provided me excellent working conditions. The good cooperation with the Academy, in particular with Marjatta Niiiitiinen, is gratefully acknowledged. The scientific organization MA TINE has supported my cryptographic research. Finally, I want to thank Springer-Verlag and especially Dr. Hans Wossner and Mrs. Ingeborg Mayer for good cooperation and timely production. Turku, May 1990 Arto Salomaa

Contents Chapter 1. Classical Two-Way Cryptography... 1 1.1 Cryptosystems and Cryptanalysis... 1 1.2 Monoalphabetic Systems... 10 1.3 Polyalphabetic and Other Systems... 22 1.4 Rotors and DES... 39 Chapter 2. The Idea of Public Keys... 55 2.1 Some Streets Are One-Way........................... 55 2.2 How to Realize the Idea... 64 2.3 Obvious Advantages of Public Keys... 71 Chapter 3. Knapsack Systems... 77 3.1 A Trapdoor is Built... 77 3.2 How to Find the Trapdoor... 87 3.3 Theory of Reachability... 96 3.4 Trying to Hide the Trapdoor Again... 108 3.5 Dense Knapsacks... 117 Chapter 4. RSA... 125 4.1 Legal World... 125 4.2 Attack and Defense... 134 4.3 Primality... 137 4.4 Cryptanalysis and Factoring... 143 4.5 Partial Information on RSA... 147 4.6 Discrete Logarithms and Key Exchange... 154 Chapter 5. Other Bases of Cryptosystems... 159 5.1 Exponentiation in Quadratic Fields... 159 5.2 Iteration of Morphisms... 166 5.3 Automata and Language Theory... 174 5.4 Coding Theory... 178 Chapter 6. Cryptographic Protocols: Surprising Vistas for Communication 181 6.1 More Than Etiquette... 181 6.2 Coin Flipping by Telephone. Poker Revisited... 184 6.3 How to Share a Secret... 187 6.4 Partial Disclosure of Secrets... 190 6.5 Oblivious Transfer... 194 6.6 Applications: Banking and Ballots... 200

X Contents 6.7 Convincing Proofs with No Details... 202 6.8 Zero-Knowledge Proofs... 208 6.9 Zero-Knowledge Proofs of Identity... 213 Appendix A. Tutorial in Complexity Theory... 219 Appendix B. Tutorial in Number Theory... 223 Problems 229 Historical and Bibliographical Remarks... 237 References 239 Index... 243