[13342] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Modulo based hash functions [was: The Pure Crypto Project's Hash Function]

daemon@ATHENA.MIT.EDU (tom st denis)
Mon May 19 15:36:48 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 19 May 2003 10:17:23 -0700 (PDT)
From: tom st denis <tomstdenis@yahoo.com>
To: cryptography@metzdowd.com
In-Reply-To: <Pine.LNX.4.31.0305190820210.1260-100000@safe.senderek.de>


--- Ralf Senderek <ralf@senderek.de> wrote:

> 
> But for the sake of clarity (and truth) let us use this hash to
> create signatures using secrets p=43 and q=79 assuming that the
> factorization of n=3397 is "unknown". We can go into 2048 bit space
> the other day.
> 
> Let x=1234 and y=2345 be two inputs.
> 
> I choose g = lcm(42, 78) = 546 as the hash's generator.
> (Please correct me if I am doing wrong here)
> 
> The SRH now is :    hash(x) = 546 ^ x mod 3397
> 
> We get:    hash(x)    = 2949
>            hash(y)    = 1284
>            hash(x+y)  = 2258
> 
> Now we use the same modulus to create signatures using d = 113 as the
> secret signingkey and e = 29 for signature verification.
> 
>            sig(hash(x))   =  1029
>            sig(hash(y))   =  1125
> 	   sig(hash(x+y)) =  2645
> 
> So if you happen to be Alice and you have created the signatures on x
> and y
> someone can compute
> 
> 	  sig(hash(x)) * sig(hash(y)) mod n = 1029 * 1125 mod 3397
>                                             = 2645
> and pretend to have Alice's signature on z = x+y, which verifies
> correctly.

Wow you single-handly rediscovered why we pad hashes before signing
with RSA...

See, this is the ====>EXACT<==== reason why you shouldn't be inventing
new crypto algorithms without at least doing some research first.

Tom

__________________________________
Do you Yahoo!?
The New Yahoo! Search - Faster. Easier. Bingo.
http://search.yahoo.com

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post