Cryptanalysis of PASS II and MiniPass

In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that...

Full description

Bibliographic Details
Main Authors: Goi, , BM, Siddiqi,, MU, Ding, , JT
Format: Article
Published: 2005
Subjects:
Online Access:http://shdl.mmu.edu.my/2352/
_version_ 1848790032851140608
author Goi, , BM
Siddiqi,, MU
Ding, , JT
author_facet Goi, , BM
Siddiqi,, MU
Ding, , JT
author_sort Goi, , BM
building MMU Institutional Repository
collection Online Access
description In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that PASS can be broken with around 2(38.3) trials. In this paper, we analyze the security of the improved versions of PASS; viz. PASS II and MiniPASS, and extend the Wu et al.'s attacks to PASS II and MiniPASS to break them. Furthermore, we discuss why and how these schemes are broken from the view point of the structure of cryptosystems and point out the fundamental weakness behind.
first_indexed 2025-11-14T18:06:10Z
format Article
id mmu-2352
institution Multimedia University
institution_category Local University
last_indexed 2025-11-14T18:06:10Z
publishDate 2005
recordtype eprints
repository_type Digital Repository
spelling mmu-23522011-08-23T02:31:52Z http://shdl.mmu.edu.my/2352/ Cryptanalysis of PASS II and MiniPass Goi, , BM Siddiqi,, MU Ding, , JT QA75.5-76.95 Electronic computers. Computer science In ACISP '00, Wu et al. proposed attacks to break the Polynomial Authentication and Signature Scheme (PASS), in particular, they are able to generate valid authentication transcripts and digital signatures without knowing the private key and any previous transcripts/signatures. They showed that PASS can be broken with around 2(38.3) trials. In this paper, we analyze the security of the improved versions of PASS; viz. PASS II and MiniPASS, and extend the Wu et al.'s attacks to PASS II and MiniPASS to break them. Furthermore, we discuss why and how these schemes are broken from the view point of the structure of cryptosystems and point out the fundamental weakness behind. 2005 Article NonPeerReviewed Goi, , BM and Siddiqi,, MU and Ding, , JT (2005) Cryptanalysis of PASS II and MiniPass. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 3783 . pp. 159-168. ISSN 0302-9743
spellingShingle QA75.5-76.95 Electronic computers. Computer science
Goi, , BM
Siddiqi,, MU
Ding, , JT
Cryptanalysis of PASS II and MiniPass
title Cryptanalysis of PASS II and MiniPass
title_full Cryptanalysis of PASS II and MiniPass
title_fullStr Cryptanalysis of PASS II and MiniPass
title_full_unstemmed Cryptanalysis of PASS II and MiniPass
title_short Cryptanalysis of PASS II and MiniPass
title_sort cryptanalysis of pass ii and minipass
topic QA75.5-76.95 Electronic computers. Computer science
url http://shdl.mmu.edu.my/2352/