Abstract
We generalize the birthday attack presented by Coppersmith at Crypto’85 which defrauded a Davies-Price message authentication scheme. We first study the birthday paradox and a variant for which some convergence results and related bounds are provided. Secondly, we generalize the Davies-Price scheme and show how the Coppersmith attack can be extended to this case. As a consequence, the case p=4 with DES (important when RSA with a 512-bit modulus is used for signature) appears not to be secure enough.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
W. Diffie and M. Hellman, “New directions in cryptography”, IEEE Transactions on Information Theory, Vol. IT-22, Nov. 1976, pp. 644–654.
R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, CACM, Vol. 21, no2, Feb. 1978, pp. 120–126.
Data Encryption Standard, FIPS Pub 46, N. B. S., U.S. Dep. Of Comm., Jan. 1977.
M. Campana and M. Girault, “Comment utiliser les fonctions de condensation dans la protection des données”, SECURICOM 1988, pp. 91–110.
G. Yuval, “How to swindle Rabin”, Cryptologia, Vol. 3, No3, Jul.1979, pp. 187–189.
D. Coppersmith, “Another birthday attack”, Advances in Cryptology, Proc. of Crypto’85, LNCS, vol. 218, Springer-Verlag, 1986, pp. 14–17.
M. Rabin, “Digital signatures”, Foundations of Secure Computation, Academic Press, New York, 1978.
D.W. Davies and W.L. Price, “The application of digital signatures based on public key cryptosystems”, Proc. of the 5th Int. Conf. on Computer Communications, Atlanta, Georgia, Oct. 1980, pp. 525–530.
W. Feller, “An Introduction to Probability theory and its Applications”, Volume 1, Wiley, 1968.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1988 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Girault, M., Cohen, R., Campana, 2. (1988). A Generalized Birthday Attack. In: Barstow, D., et al. Advances in Cryptology — EUROCRYPT ’88. EUROCRYPT 1988. Lecture Notes in Computer Science, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45961-8_12
Download citation
DOI: https://doi.org/10.1007/3-540-45961-8_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-50251-7
Online ISBN: 978-3-540-45961-3
eBook Packages: Springer Book Archive