[17065] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

PK -> OTP?

daemon@ATHENA.MIT.EDU (Matt Crawford)
Tue Mar 15 10:39:09 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 14 Mar 2005 09:46:04 -0600
From: Matt Crawford <crawdad@fnal.gov>
To: cryptography@metzdowd.com

My educated-layman's opinion is that the following is not feasible, but 
I'd be happy to be shown wrong ...

Given a closed public-key device such as a typical smart card with its 
limited set of operations (chiefly "sign"), is it possible to implement 
a challenge/response function such that

* Both the challenge and the response are short enough for an average 
user to be willing to type them when needed.

* The challenge can be generated, and the response verified using the 
cardholder's public key and a reasonable amount of computation.

My reasoning is that the full output of the signing function will 
almost always be as long as the key, if only response = f(signature) is 
given, with f having a range in some set of size ~ 2^32, verifying 
response must be nearly as hard as brute-force guessing.

                 Matt Crawford   <crawdad@fnal.gov>




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post