Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
Hi-index | 0.00 |
A new cryptosystem is proposed in the international patent WO/2009/066313 by Artus. The symmetric-key primitive in the cryptosystem resembles a stream cipher. The system differs markedly from cryptosystems used today in that the secret key is changed with the plaintext. The patent does not discuss key management (generation, transmission) in sufficient detail. Some of the proposed methods for transmission of keys are highly insecure and an algorithm for key generation is missing. In this paper, we find that related-key attacks of negligibly low complexity (data/time) can result when certain (flawed) key generation algorithms are used. We also present a negligibly-low-complexity attack in a non-related-key setting. We hope that the results caution potential users of the cryptosystem.