Some Remarks on Lucas-Based Cryptosystems

  • Authors:
  • Daniel Bleichenbacher;Wieb Bosma;Arjen K. Lenstra

  • Affiliations:
  • -;-;-

  • Venue:
  • CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1995

Quantified Score

Hi-index 0.00

Visualization

Abstract

We review the well-known relation between Lucas sequences and exponentiation. This leads to the observation that certain public-key cryptosystems that are based on the use of Lucas sequences have some elementary properties their re-inventors were apparently not aware of. In particular, we present a chosen-message forgery for 'LUC' (cf. [21; 25]), and we show that 'LUCELG' and 'LUCDIF' (cf. [22, 26]) are vulnerable to subexponential time attacks. This proves that various claims that were made about Lucas-based cryptosystems are incorrect.