Cryptanalysis of PASS II and MiniPass
In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that...
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2352/ |
| _version_ | 1848790032851140608 |
|---|---|
| author | Goi, , BM Siddiqi,, MU Ding, , JT |
| author_facet | Goi, , BM Siddiqi,, MU Ding, , JT |
| author_sort | Goi, , BM |
| building | MMU Institutional Repository |
| collection | Online Access |
| description | In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that PASS can be broken with around 2(38.3) trials. In this paper, we analyze the security of the improved versions of PASS; viz. PASS II and MiniPASS, and extend the Wu et al.'s attacks to PASS II and MiniPASS to break them. Furthermore, we discuss why and how these schemes are broken from the view point of the structure of cryptosystems and point out the fundamental weakness behind. |
| first_indexed | 2025-11-14T18:06:10Z |
| format | Article |
| id | mmu-2352 |
| institution | Multimedia University |
| institution_category | Local University |
| last_indexed | 2025-11-14T18:06:10Z |
| publishDate | 2005 |
| recordtype | eprints |
| repository_type | Digital Repository |
| spelling | mmu-23522011-08-23T02:31:52Z http://shdl.mmu.edu.my/2352/ Cryptanalysis of PASS II and MiniPass Goi, , BM Siddiqi,, MU Ding, , JT QA75.5-76.95 Electronic computers. Computer science In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that PASS can be broken with around 2(38.3) trials. In this paper, we analyze the security of the improved versions of PASS; viz. PASS II and MiniPASS, and extend the Wu et al.'s attacks to PASS II and MiniPASS to break them. Furthermore, we discuss why and how these schemes are broken from the view point of the structure of cryptosystems and point out the fundamental weakness behind. 2005 Article NonPeerReviewed Goi, , BM and Siddiqi,, MU and Ding, , JT (2005) Cryptanalysis of PASS II and MiniPass. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 3783 . pp. 159-168. ISSN 0302-9743 |
| spellingShingle | QA75.5-76.95 Electronic computers. Computer science Goi, , BM Siddiqi,, MU Ding, , JT Cryptanalysis of PASS II and MiniPass |
| title | Cryptanalysis of PASS II and MiniPass |
| title_full | Cryptanalysis of PASS II and MiniPass |
| title_fullStr | Cryptanalysis of PASS II and MiniPass |
| title_full_unstemmed | Cryptanalysis of PASS II and MiniPass |
| title_short | Cryptanalysis of PASS II and MiniPass |
| title_sort | cryptanalysis of pass ii and minipass |
| topic | QA75.5-76.95 Electronic computers. Computer science |
| url | http://shdl.mmu.edu.my/2352/ |