Abstract
In this note, an interesting trend about the way in which the number theory in multicast networks is often applied, is reported. Surprisingly, in recent years, some new proposals for key distribution schemes are still proposed employing very similar erroneous concepts than those applied in 1999, which were already reported by professor Muñoz-Masqué in 2005. Some apparently well-constructed cryptographic equations suffer from a real weakness due to a flaw in the definition of the cryptographic keys, allowing to perform an easy factorization and, as a consequence, the recovering of the user’s keys. Thirteen years later, very similar weaknesses arise.
Dedicated to Jaime Muñoz Masqué, unquestionable reference and irreplaceable guide in science and life on the occassion of his 65th birthday
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Text in Maths 138. Springer, Berlin (1993)
Gathen, J., Gerhard, J.: Modern Computer Algebra. Cambridge University Press, Cambridge (1999)
Liaw, H.T.: Broadcasting cryptosystem in computer networks. Comput. Math. Appl. 37, 85–87 (1999)
Menezes, A., Oorschot, P., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Muñoz Masqué, J., Peinado, A.: Cryptanalysis of improved Liaw’s broadcasting cryptosystem. J. Inf. Sci. Eng. 22, 391–399 (2006)
Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)
Peinado, A., Ortiz, A.: Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm. Log. J. IGPL 21(4), 671–679 (2013)
Pollard, J.M.: A Monte Carlo method for factorization. BIT Numer. Math. 15(3), 331–334 (1975)
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
Sun, H.M.: Security of broadcasting cryptosystem in computer networks. Electron. Lett. 35, 2108–2109 (1999)
Tseng, Y.M., Jan, J.K.: Cryptanalysis of Liaw’s broadcasting cryptosystem. Comput. Math. Appl. 41, 1575–1578 (2001)
Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65, 1360–1368 (2013)
Acknowledgments
This work has been partially supported by project TIN2014-55325-C2-1-R (ProCriCiS), funded by Ministerio de Economía y Competitividad, Spain.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Peinado, A. (2016). Flaws in the Application of Number Theory in Key Distribution Schemes for Multicast Networks. In: Castrillón López, M., Hernández Encinas, L., Martínez Gadea, P., Rosado María, M. (eds) Geometry, Algebra and Applications: From Mechanics to Cryptography. Springer Proceedings in Mathematics & Statistics, vol 161. Springer, Cham. https://doi.org/10.1007/978-3-319-32085-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-32085-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32084-7
Online ISBN: 978-3-319-32085-4
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)