[go: up one dir, main page]

Skip to main content

Speeding Up Secure Sessions Establishment on the Internet

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

  • 6035 Accesses

Abstract

We propose a method for speeding up secure sessions establishment between clients and servers on the Internet, which is applicable for both RSA and DH. In the case of RSA, the method effectively off- loads computational work from a heavily-loaded server to its clients. In the case of DH, the improved performance is obtained at the price of extended certificates. Our method is built upon a scheme called simultaneous multiple exponentiation, and basically splits the work of simultaneous multiple exponentiation between two entities. The challenge is to do so without leaking secret bits of the secret exponent, and still improve the performance. We prove that these two tasks can be achieved simultaneously.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. P. Beguin, and J-J. Quisquater. Fast server-aided RSA signatures secure against active attacks. In Proceedings of Crypto 95, pages 57–69, 1995. 435

    Google Scholar 

  2. M. Bellare, J. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In Proceedings of Eurocrypt 98, pages 236–250, 1998. 448

    Google Scholar 

  3. M. Bellare, and P. Rogaway. Optimal Assymetric Encryption-How to Encrypt with RSA. In Advances in Cryptology Eurocrypt 94, pages 92–111, 1994. 434, 437

    Google Scholar 

  4. D. Boneh. The decision Diffie-Hellman problem. In Proceedings of the Third Algorithmic Number Theory Symp., LNCSVol. 1423, pages 48–63, 1998. 436

    Google Scholar 

  5. D. Boneh, and H. Shacham. Fast variants of RSA. In RSA Laboratories Cryptobytes, Volume 5 No. 1, pages 1–8, Winter/Spring 2002. 438

    Google Scholar 

  6. E. F. Brickell, D. M. Gordon, K. S. McCurley, and D. Wilson. Fast exponentiation with precomputation. In Proceedings of Eurocrypt 92, pages 200–207, 1992. 434

    Google Scholar 

  7. C. Coup’e, P. Nguyen, and J. Stern. The Effiectiveness of Lattice Attacks Against Low-Exponent RSA. In Proceedings of PKC’99, pages 204–218, 1999.

    Google Scholar 

  8. T. Dierks, and C. Allen. RFC 2246: The TLS Protocol Version 1. January 1999. http://www.ietf.org/rfc/rfc2246.txt 433

  9. W. Diffie, and M. Hellman. New directions in Cryptography. IEEE Transactions on Information Theory, Volume 22, No. 6, pages 644–654, 1976. 433

    Article  MATH  MathSciNet  Google Scholar 

  10. M. R. Garey, and D. S. Johnson. Computers and Intractability: A Guide to the Theory of NP-Completeness. Freeman, New York, 1979. 444

    MATH  Google Scholar 

  11. S. Hong, J. Shin, H. Lee-Kwang, and H. Yoon. A new approach to server-aided secret computation. In Proceedings of the 1st International Conference on Information Security and Cryptology-ICISC’98, pages 33–45, 1998. 435

    Google Scholar 

  12. B. Kaliski, and J. Staddon. RFC 2437: PKCS #1-RSA Cryptography Specifications Version 2.0. October 1998. http://www.ietf.org/rfc/rfc2437.txt 434

  13. S. Kent, and R. Atkinson. Security Architecture for the Internet Protocol. RFC2401, http://www.ietf.org/rfc/rfc2401.txt 433

  14. C.H. Lim, and P. J. Lee. More fiexible exponentiation with precomputation. In Proceedings of Crypto 94, pages 95–107, 1994. 434

    Google Scholar 

  15. C.H. Lim, and P. J. Lee. Security and Performance of server-aided RSA computation protocols. In Proceedings of Crypto 95, pages 70–83, 1995. 435

    Google Scholar 

  16. T. Matsumoto, H. Imai, C. S. Laih, and S.M. Yen. On verifiable implicit asking protocol for RSA computation. In Proceedings of Auscrypt 92, pages 296–307, 1993. 435

    Google Scholar 

  17. T. Matsumoto, K. Kato, and H. Imai. Speeding up Secret Computations with Insecure Auxiliary Devices. In Proceedings of Crypto 88, pages 497–506, 1990. 435

    Google Scholar 

  18. A. J. Menezes, P. C. Van Oorschot, and S.A. Vanstone. Handbook of Applied Cryptography, CRC Press, 1997. 433

    Google Scholar 

  19. J. Merkle. Multi-Round Passive Attacks on Server-Aided RSA Protocols. In Proceedings of CCS’ 00, pages 102–107, 2000. 435

    Google Scholar 

  20. B. Möller. Algorithms for Multi-Exponentiation. In Selected Areas in Cryptography (SAC) 2001, LNCS Vol. 2259, pages 165–180, 2001. 449

    Chapter  Google Scholar 

  21. National Institute for Standards and Technology. Digital Signature Standard (DSS). Technical Report 169, 1991. 434

    Google Scholar 

  22. P. Nguyen, and J. Stern. The B’eguin-Quisquater server-aided RSA protocol from Crypto’ 95 is not secure. In Proceedings of Asiacrypt’ 98, pages 372–379, 1998. 435

    Google Scholar 

  23. B. Pfitzmann, and M. Waidner. Attacks on protocols for server-aided RSA computation. In Proceedings of Eurocrypt 92, pages 153–162, 1992. 435

    Google Scholar 

  24. R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Communication of the ACM, 21:120–126, 1978. 433

    Article  MATH  MathSciNet  Google Scholar 

  25. C.P. Schnorr. Efficient signature generation by smart cards. J. Cryptology 4 (3), pages 161–174, 1991. 434

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Sella, Y. (2003). Speeding Up Secure Sessions Establishment on the Internet. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_30

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_30

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics