Skip to main content

Flaws in the Application of Number Theory in Key Distribution Schemes for Multicast Networks

  • Chapter
  • First Online:
Geometry, Algebra and Applications: From Mechanics to Cryptography

Part of the book series: Springer Proceedings in Mathematics & Statistics ((PROMS,volume 161))

  • 1226 Accesses

Abstract

In this note, an interesting trend about the way in which the number theory in multicast networks is often applied, is reported. Surprisingly, in recent years, some new proposals for key distribution schemes are still proposed employing very similar erroneous concepts than those applied in 1999, which were already reported by professor Muñoz-Masqué in 2005. Some apparently well-constructed cryptographic equations suffer from a real weakness due to a flaw in the definition of the cryptographic keys, allowing to perform an easy factorization and, as a consequence, the recovering of the user’s keys. Thirteen years later, very similar weaknesses arise.

Dedicated to Jaime Muñoz Masqué, unquestionable reference and irreplaceable guide in science and life on the occassion of his 65th birthday

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Text in Maths 138. Springer, Berlin (1993)

    Google Scholar 

  2. Gathen, J., Gerhard, J.: Modern Computer Algebra. Cambridge University Press, Cambridge (1999)

    MATH  Google Scholar 

  3. Liaw, H.T.: Broadcasting cryptosystem in computer networks. Comput. Math. Appl. 37, 85–87 (1999)

    Article  MathSciNet  MATH  Google Scholar 

  4. Menezes, A., Oorschot, P., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  MATH  Google Scholar 

  5. Muñoz Masqué, J., Peinado, A.: Cryptanalysis of improved Liaw’s broadcasting cryptosystem. J. Inf. Sci. Eng. 22, 391–399 (2006)

    Google Scholar 

  6. Naranjo, J.A.M., Antequera, N., Casado, L.G., López-Ramos, J.A.: A suite of algorithms for key distribution and authentication in centralized secure multicast environments. J. Comput. Appl. Math. 236, 3042–3051 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  7. Peinado, A., Ortiz, A.: Cryptanalysis of a key refreshment scheme for multicast protocols by means of genetic algorithm. Log. J. IGPL 21(4), 671–679 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  8. Pollard, J.M.: A Monte Carlo method for factorization. BIT Numer. Math. 15(3), 331–334 (1975)

    Article  MathSciNet  MATH  Google Scholar 

  9. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  10. Sun, H.M.: Security of broadcasting cryptosystem in computer networks. Electron. Lett. 35, 2108–2109 (1999)

    Article  Google Scholar 

  11. Tseng, Y.M., Jan, J.K.: Cryptanalysis of Liaw’s broadcasting cryptosystem. Comput. Math. Appl. 41, 1575–1578 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  12. Vijayakumar, P., Bose, S., Kannan, A.: Centralized key distribution protocol using the greatest common divisor method. Comput. Math. Appl. 65, 1360–1368 (2013)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work has been partially supported by project TIN2014-55325-C2-1-R (ProCriCiS), funded by Ministerio de Economía y Competitividad, Spain.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Peinado .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Peinado, A. (2016). Flaws in the Application of Number Theory in Key Distribution Schemes for Multicast Networks. In: Castrillón López, M., Hernández Encinas, L., Martínez Gadea, P., Rosado María, M. (eds) Geometry, Algebra and Applications: From Mechanics to Cryptography. Springer Proceedings in Mathematics & Statistics, vol 161. Springer, Cham. https://doi.org/10.1007/978-3-319-32085-4_16

Download citation

Publish with us

Policies and ethics