Global Information Lookup Global Information

Trapdoor function information


The idea of trapdoor function. A trapdoor function f with its trapdoor t can be generated by an algorithm Gen. f can be efficiently computed, i.e., in probabilistic polynomial time. However, the computation of the inverse of f is generally hard, unless the trapdoor t is given.[1]

In theoretical computer science and cryptography, a trapdoor function is a function that is easy to compute in one direction, yet difficult to compute in the opposite direction (finding its inverse) without special information, called the "trapdoor". Trapdoor functions are a special case of one-way functions and are widely used in public-key cryptography.[2]

In mathematical terms, if f is a trapdoor function, then there exists some secret information t, such that given f(x) and t, it is easy to compute x. Consider a padlock and its key. It is trivial to change the padlock from open to closed without using the key, by pushing the shackle into the lock mechanism. Opening the padlock easily, however, requires the key to be used. Here the key t is the trapdoor and the padlock is the trapdoor function.

An example of a simple mathematical trapdoor is "6895601 is the product of two prime numbers. What are those numbers?" A typical "brute-force" solution would be to try dividing 6895601 by many prime numbers until finding the answer. However, if one is told that 1931 is one of the numbers, one can find the answer by entering "6895601 ÷ 1931" into any calculator. This example is not a sturdy trapdoor function – modern computers can guess all of the possible answers within a second – but this sample problem could be improved by using the product of two much larger primes.

Trapdoor functions came to prominence in cryptography in the mid-1970s with the publication of asymmetric (or public-key) encryption techniques by Diffie, Hellman, and Merkle. Indeed, Diffie & Hellman (1976) coined the term. Several function classes had been proposed, and it soon became obvious that trapdoor functions are harder to find than was initially thought. For example, an early suggestion was to use schemes based on the subset sum problem. This turned out rather quickly to be unsuitable.

As of 2004, the best known trapdoor function (family) candidates are the RSA and Rabin families of functions. Both are written as exponentiation modulo a composite number, and both are related to the problem of prime factorization.

Functions related to the hardness of the discrete logarithm problem (either modulo a prime or in a group defined over an elliptic curve) are not known to be trapdoor functions, because there is no known "trapdoor" information about the group that enables the efficient computation of discrete logarithms.

A trapdoor in cryptography has the very specific aforementioned meaning and is not to be confused with a backdoor (these are frequently used interchangeably, which is incorrect). A backdoor is a deliberate mechanism that is added to a cryptographic algorithm (e.g., a key pair generation algorithm, digital signing algorithm, etc.) or operating system, for example, that permits one or more unauthorized parties to bypass or subvert the security of the system in some fashion.

  1. ^ Ostrovsky, pp. 6-9
  2. ^ Bellare, M (June 1998). "Many-to-one trapdoor functions and their relation to public-key cryptosystems". Advances in Cryptology — CRYPTO '98. Lecture Notes in Computer Science. Vol. 1462. pp. 283–298. doi:10.1007/bfb0055735. ISBN 978-3-540-64892-5. S2CID 215825522.

and 24 Related for: Trapdoor function information

Request time (Page generated in 0.8176 seconds.)

Trapdoor function

Last Update:

In theoretical computer science and cryptography, a trapdoor function is a function that is easy to compute in one direction, yet difficult to compute...

Word Count : 1316

Trapdoor

Last Update:

mills, however, its list of uses has grown over time. The trapdoor has played a pivotal function in the operation of the gallows, cargo ships, trains, booby...

Word Count : 590

Rabin cryptosystem

Last Update:

based on a trapdoor function whose security, like that of RSA, is related to the difficulty of integer factorization. The Rabin trapdoor function has the...

Word Count : 2399

Kyber

Last Update:

variant of the learning with errors lattice problem as its basic trapdoor function. It won the NIST competition for the first post-quantum cryptography...

Word Count : 1471

Schnorr signature

Last Update:

Typically a Schnorr group is used. All users agree on a cryptographic hash function H : { 0 , 1 } ∗ → Z q {\displaystyle H:\{0,1\}^{*}\rightarrow \mathbb {Z}...

Word Count : 1237

Cryptographic hash function

Last Update:

A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...

Word Count : 6067

Key derivation function

Last Update:

In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a master...

Word Count : 1625

Pseudorandom function family

Last Update:

In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in...

Word Count : 1023

Rainbow table

Last Update:

is a precomputed table for caching the outputs of a cryptographic hash function, usually for cracking password hashes. Passwords are typically stored not...

Word Count : 3456

Feistel cipher

Last Update:

similar operations, and both consist of iteratively running a function called a "round function" a fixed number of times. Many modern symmetric block ciphers...

Word Count : 1316

PKCS 7

Last Update:

secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...

Word Count : 310

BLS digital signature

Last Update:

{\displaystyle g^{x}} , g y {\displaystyle g^{y}} . Intuitively, the pairing function e {\displaystyle e} does not help us compute g x y {\displaystyle g^{xy}}...

Word Count : 1009

Digital signature

Last Update:

schemes. The first such scheme which is not built on trapdoor functions but rather on a family of function with a much weaker required property of one-way...

Word Count : 5198

Oblivious pseudorandom function

Last Update:

An oblivious pseudorandom function (OPRF) is a cryptographic function, similar to a keyed-hash function, but with the distinction that in an OPRF two...

Word Count : 3333

Public key fingerprint

Last Update:

public key. Fingerprints are created by applying a cryptographic hash function to a public key. Since fingerprints are shorter than the keys they refer...

Word Count : 1286

Optimal asymmetric encryption padding

Last Update:

plaintext prior to asymmetric encryption. When combined with any secure trapdoor one-way permutation f {\displaystyle f} , this processing is proved in...

Word Count : 1451

PKCS 12

Last Update:

secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...

Word Count : 698

ElGamal encryption

Last Update:

m {\displaystyle m} of G {\displaystyle G} using a reversible mapping function. Choose an integer y {\displaystyle y} randomly from { 1 , … , q − 1 }...

Word Count : 1477

Threshold cryptosystem

Last Update:

Perhaps the first system with complete threshold properties for a trapdoor function (such as RSA) and a proof of security was published in 1994 by Alfredo...

Word Count : 868

Certificate signing request

Last Update:

secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...

Word Count : 1114

Preimage attack

Last Update:

attack on cryptographic hash functions tries to find a message that has a specific hash value. A cryptographic hash function should resist attacks on its...

Word Count : 895

Pigpen cipher

Last Update:

secret Trapdoor function Trusted timestamping Key-based routing Onion routing Garlic routing Kademlia Mix network Mathematics Cryptographic hash function Block...

Word Count : 1226

Security level

Last Update:

the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is usually expressed as a number of "bits of...

Word Count : 1360

GGH encryption scheme

Last Update:

Halevi, and uses a trapdoor one-way function which relies on the difficulty of lattice reduction. The idea included in this trapdoor function is that, given...

Word Count : 831

PDF Search Engine © AllGlobal.net