Abstract
RSA-KEM is a popular key encapsulation mechanism that combines the RSA trapdoor permutation with a key derivation function (KDF). Often the details of the KDF are viewed as orthogonal to the RSA-KEM construction and the RSA-KEM proof of security models the KDF as a random oracle. In this paper we present an AES-based KDF that has been explicitly designed so that we can appeal to currently held views on the ideal behaviour of the AES when proving the security of RSA-KEM. Thus, assuming that encryption with the AES provides a permutation of 128-bit input blocks that is chosen uniformily at random for each key k, the security of RSA-KEM against chosen-ciphertext attacks can be related to the hardness of inverting RSA.
Chapter PDF
References
Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1–15. Springer, Heidelberg (1996)
Bellare, M., Rogaway, P.: Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In: Proceedings of the First Annual Conference on Computer and Communications Security. ACM, New York (1993)
Bellare, M., Rogaway, P.: Optimal Asymmetric encryption - How to Encrypt with RSA. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 92–111. Springer, Heidelberg (1995)
Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290–305. Springer, Heidelberg (2004)
Black, J., Rogaway, P., Shrimpton, T.: Black-box analysis of the block-cipher-based hash-function constructions from PGV. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 320–335. Springer, Heidelberg (2002)
Daemen, J., Rijmen, V.: AES Proposal: Rijndael. Version 2 (1999)
Dai, W.: Performance figures. Available via, www.eskimo.com/~weidai/
Dent, A.W.: A designer’s guide to kEMs. In: Paterson, K.G. (ed.) Cryptography and Coding 2003. LNCS, vol. 2898, pp. 133–151. Springer, Heidelberg (2003)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Meyer, C.H., Schilling, M.: Secure program load with manipulation detection code. In: Proceedings of SECURICOM 1988, pp. 111–130 (1998)
Okamoto, T., Pointcheval, D.: REACT: Rapid enhanced-security asymmetric cryptosystem transform. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 159–175. Springer, Heidelberg (2001)
National Institute of Standards and Technology. FIPS 196: The Advanced Encryption Standard (October 2001)Available via, csrc.nist.gov
National Institute of Standards and Technology. FIPS 46-2: The Data Encryption Standard (December 1993)Available via, www.itl.nist.gov/fipspubs/
National Institute of Standards and Technology. FIPS 180-2: The Secure Hash Standard (August 2002)Available via, csrc.nist.gov
National Institute of Standards and Technology. Special Publication SP-800-38A: Recommondation for Block Cipher Modes of Operation – Methods and Techniques (December 2001)Available via, csrc.nist.gov
Rivest, R., Shamir, A., Adleman, L.: A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)
Laboratories, R.S.A.: PKCS #1 v2.1: RSA Cryptography Standard, June 14 (2002)Available via, www.rsasecurity.com
Shoup, V.: A Proposal for an ISO Standard for Public Key Encryption. Preprint (December 2001)Available via, eprint.iacr.org/2001/112
Wang, X., Feng, D., Lai, X., Yu, H.: Collisions for hash functions MD4, MD5, Haval-128 and RIPEMD. Available via, http://eprint.iacr.org/2004/199
Zheng, Y., Seberry, J.: Practical approaches to attaining security against adaptively chosen ciphertext attacks. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 292–304. Springer, Heidelberg (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jonsson, J., Robshaw, M.J.B. (2005). Securing RSA-KEM via the AES. In: Vaudenay, S. (eds) Public Key Cryptography - PKC 2005. PKC 2005. Lecture Notes in Computer Science, vol 3386. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30580-4_4
Download citation
DOI: https://doi.org/10.1007/978-3-540-30580-4_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24454-7
Online ISBN: 978-3-540-30580-4
eBook Packages: Computer ScienceComputer Science (R0)