Lecture Notes in Computer Science 5580 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany
Bart Preneel (Ed.) Progress in Cryptology AFRICACRYPT 2009 Second International Conference on Cryptology in Africa Gammarth, Tunisia, June 21-25, 2009 Proceedings 13
Volume Editor Bart Preneel Katholieke Universiteit Leuven Dept. Electrical Engineering-ESAT/COSIC Kasteelpark Arenberg 10, Bus 2446, 3001 Leuven, Belgium E-mail: bart.preneel@esat.kuleuven.be Library of Congress Control Number: Applied for CR Subject Classification (1998): E.3, F.2.1-2, G.2.1, D.4.6, K.6.5, C.2, J.1 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-02383-5 Springer Berlin Heidelberg New York ISBN-13 978-3-642-02383-5 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com Springer-Verlag Berlin Heidelberg 2009 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12693764 06/3180 543210
Preface AFRICACRYPT 2009 was held during June 21 25, 2009 in Gammarth, Tunisia. After AFRICACRYPT 2008 in Casablanca, Morocco, it was the second international research conference in Africa dedicated to cryptography. The conference received 70 submissions; four of these were identified as irregular submissions. The remaining papers went through a careful doubly anonymous review process. Every paper received at least three reports; papers with a Program Committee member as co-author received five reports. After the review period, 25 papers were accepted for presentation. The authors were requested to revise their papers based on the comments received. The program was completed with invited talks by Antoine Joux, Ueli Maurer and Nigel Smart. First and foremost we would like to thank the members of the Program Committee for the many hours spent on reviewing and discussing the papers, thereby producing more than 600 Kb of comments. They did an outstanding job. We would also like to thank the numerous external reviewers for their assistance. We are also indebted to Shai Halevi for the support provided for his excellent Web- Submission-and-Review software package. We also wish to heartily thank Sami Ghazali, the General Chair, and Sami Omar, the General Co-chair, for their efforts in the organization of the conference. Special thanks go to the Tunisian Ministry of Communication Technologies, the National Digital Certification Agency, and the Tunisian Internet Agency for their support of the organization. Finally, we would like to thank the participants, submitters, authors and presenters who all together made AFRICACRYPT 2009 a great success. I hope that the AFRICACRYPT conference tradition has now taken firm root and that we will witness a fruitful development of academic research in cryptology in Africa. April 2009 Bart Preneel
Organization AFRICACRYPT 2009 was organized under the patronage of the Tunisian Ministry of Communication Technologies by the National Digital Certification Agency, and the Tunisian Internet Agency. AFRIACRYPT 2009 was organized in cooperation with the International Association for Cryptologic Research (IACR). Executive Committee Conference Chair Conference Co-chair Program Chair Sami Ghazali (National Digital Certification Agency, Tunisia) Sami Omar (University of Tunis, Tunisia) Bart Preneel (Katholieke Universiteit Leuven, Belgium) Program Committee Michel Abdalla Paulo Barreto Tom Berson Anne Canteaut Dario Catalano Hervé Chabanne Jean-Marc Couveignes Kris Gaj Henri Gilbert Helena Handschuh Martin Hirt Seokhie Hong Tetsu Iwata Yassine Lakhnech Tanja Lange Helger Lipmaa Keith Martin Mitsuru Matsui Alexander May Sihem Mesnager Kaisa Nyberg Sami Omar Elisabeth Oswald Reihaneh Safavi-Naini Kazue Sako Ali Aydın Selçuk ENS, Paris, France University of São Paulo (USP), Brazil Anagram Laboratories, USA INRIA Paris-Rocquencourt, France University of Catania, Italy Sagem SécuritéandTélécom Paristech, France Université Toulouse2,France George Mason University, USA Orange Labs, France Spansion, France ETH Zurich, Switzerland Korea University, Korea Nagoya University, Japan University Joseph Fourier-Grenoble, France Technische Universiteit Eindhoven, The Netherlands Cybernetica AS, Estonia Royal Holloway University of London, UK Mitsubishi Electric, Japan R.U. Bochum, Germany Université Paris 8, France Helsinki University of Technology and Nokia, Finland University of Tunis, Tunisia University of Bristol, UK University of Calgary, Canada NEC, Japan Bilkent University, Turkey
VIII Organization Christine Swart Serge Vaudenay Frederik Vercauteren Michael Wiener Yiqun Lisa Yin University of Cape Town, South Africa EPFL, Switzerland Katholieke Universiteit Leuven, Belgium Cryptographic Clarity, Canada Independent Security Consultant, USA External Reviewers Divesh Aggarwal Hadi Ahmadi Murat Ak Toshinori Araki Roberto Avanzi Lejla Batina Aurelie Bauer Zuzana Beerliova Daniel J. Bernstein Arnaud Boscher Julien Bringer Renier Broker Bogdan Carbunar Claude Carlet Rafik Chaabouni Donghoon Chang Claude Crépeau Hüseyin Demirci Alex Dent Mario Di Raimondo Orr Dunkelman Junfeng Fan Dario Fiore Jun Furukawa Martin Gagne Pierrick Gaudry Benedikt Gierlichs Malakondayya Gorantla Nicolas Guillermin Tim Güneysu Risto Hakala Jens Hermans Miia Hermelin Thomas Icart Toshiyuki Isshiki Takashi Ito Orhun Kara Kamer Kaya Bruno Kindarji Miroslav Knezevic Patrick Lacharme Fabien Laguillaumie Thanh Ha Le Jesang Lee Benoît Libert Moses Liskov Christoph Lucas Andrew Moss María Naya-Plasencia Gregory Neven Satoshi Obana Khaled Ouafi Sylvain Pasini Maura Paterson Ludovic Perret Duong Hieu Phan Dominik Raub Yu Sasaki Berry Schoenmakers Nicolas Sendrier Hongsong Shi Igor Shparlinski Francesco Sica Michal Sramka Drew Sutherland Daisuke Suzuki Björn Tackmann Katsuyuki Takashima Isamu Teranishi Stefano Tessaro Mike Tunstall Damien Vergnaud Ivan Visconti Bogdan Warinschi Qianhong Wu Vassilis Zikas
Table of Contents Hash Functions Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL... 1 Gaoli Wang and Shaohui Wang Cryptanalysis of Vortex... 14 Jean-Philippe Aumasson, Orr Dunkelman, Florian Mendel, Christian Rechberger, and Søren S. Thomsen Two Passes of Tiger Are Not One-Way... 29 Florian Mendel Block Ciphers Generic Attacks on Feistel Networks with Internal Permutations... 41 Joana Treger and Jacques Patarin Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks... 60 Marine Minier, Raphael C.-W. Phan, and Benjamin Pousse Asymmetric Encryption Reducing Key Length of the McEliece Cryptosystem... 77 Thierry P. Berger, Pierre-Louis Cayrel, Philippe Gaborit, and Ayoub Otmani Cryptanalysis of RSA Using the Ratio of the Primes... 98 Abderrahmane Nitaj Digital Signatures New RSA-Based (Selectively) Convertible Undeniable Signature Schemes... 116 Le Trieu Phong, Kaoru Kurosawa, and Wakaha Ogata A Schnorr-Like Lightweight Identity-Based Signature Scheme... 135 David Galindo and Flavio D. Garcia On the Theoretical Gap between Group Signatures with and without Unlinkability... 149 Go Ohtake, Arisa Fujii, Goichiro Hanaoka, and Kazuto Ogawa
X Table of Contents Practical Threshold Signatures with Linear Secret Sharing Schemes... 167 İlker Nadi Bozkurt, Kamer Kaya, and Ali Aydın Selçuk Asymmetric Encryption and Anonymity Certified Encryption Revisited... 179 Pooya Farshim and Bogdan Warinschi Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems... 198 Siamak F. Shahandashti and Reihaneh Safavi-Naini Anonymity from Public Key Encryption to Undeniable Signatures... 217 Laila El Aimani Key Agreement Protocols Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps... 235 Manuel Barbosa and Pooya Farshim Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness... 254 Michel Abdalla, Dario Catalano, Céline Chevalier, and David Pointcheval Cryptographic Protocols Unifying Zero-Knowledge Proofs of Knowledge... 272 Ueli Maurer Co-sound Zero-Knowledge with Public Keys... 287 Carmine Ventre and Ivan Visconti Another Look at Extended Private Information Retrieval Protocols... 305 Julien Bringer and Hervé Chabanne Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions... 323 Huafei Zhu and Feng Bao Efficient Implementations Exponent Recoding and Regular Exponentiation Algorithms... 334 Marc Joye and Michael Tunstall
Table of Contents XI Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware... 350 Owen Harrison and John Waldron Fast Elliptic-Curve Cryptography on the Cell Broadband Engine... 368 Neil Costigan and Peter Schwabe On Modular Decomposition of Integers... 386 Billy Bob Brumley and Kaisa Nyberg Implementation Attacks Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed... 403 Markus Kasper, Timo Kasper, Amir Moradi, and Christof Paar An Improved Fault Based Attack of the Advanced Encryption Standard... 421 Debdeep Mukhopadhyay Author Index... 435