Ralph Merkle Puzzle Cryptographic System
   HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, Merkle's Puzzles is an early construction for a
public-key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
cryptosystem, a protocol devised by
Ralph Merkle Ralph C. Merkle (born February 2, 1952) is a computer scientist and mathematician. He is one of the inventors of public-key cryptography, the inventor of cryptographic hashing, and more recently a researcher and speaker on cryonics. Contribution ...
in 1974 and published in 1978. It allows two parties to agree on a
shared secret In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. This usually refers to the key of a symmetric cryptosystem. The shared secret can be a password, a passphrase, a big number, or a ...
by exchanging messages, even if they have no secrets in common beforehand.


Description

Suppose
Alice and Bob Alice and Bob are fictional characters commonly used as placeholders in discussions about cryptographic systems and protocols, and in other science and engineering literature where there are several participants in a thought experiment. The A ...
wish to communicate. Bob can send a message to Alice as follows: first he creates a large number of puzzles, each of a moderate amount of difficulty — it must be possible for Alice to solve the puzzle with a moderate amount of computing effort. The puzzles are in the form of an
encrypt In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
ed message with an unknown
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (map ...
; the key must be short enough to allow a
brute force attack In cryptography, a brute-force attack consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly. The attacker systematically checks all possible passwords and passphrases until the correct ...
. Bob sends all of the puzzles (i.e. encrypted messages) to Alice, who chooses one randomly, and solves it. The decrypted solution contains an identifier as well as a session key, so Alice can communicate back to Bob which puzzle she has solved. Both parties now have a common key; Alice, because she solved a puzzle, and Bob, because he sent the puzzle. Any eavesdropper (Eve, say) has a harder task — she does not know which puzzle was solved by Alice. Her best strategy is to solve all the puzzles, but since there are so many, this is more computationally expensive for Eve than it is for Alice.


High-level description

# Bob generates 2N messages containing, "This is message X. This is the symmetrical key Y", where X is a randomly generated identifier, and Y is a randomly generated secret key meant for symmetrical encryption. Hence, both X and Y are unique to each message. All the messages are encrypted in a way such that a user may conduct a brute force attack on each message with some difficulty. Bob sends all the encrypted messages to Alice. # Alice receives all the encrypted messages, and randomly chooses a single message to brute force. After Alice discovers both the identifier X and the secret key Y inside that message, she encrypts her clear text with the secret key Y, and sends that identifier (in cleartext) with her cipher text to Bob. # Bob looks up the secret key paired with that identifier, since he's the one who generated them in the first place, and deciphers Alice's cipher text with that secret key. Note that the eavesdropper Eve can read the identifier X sent back (in cleartext) from Alice to Bob, but has no way to map that to the secret key Y that Bob and Alice are now using for their ongoing communication, because the value of X within each message was randomly generated.


Complexity and security analysis

The parameters of the puzzle game can be chosen to make it considerably harder to for an eavesdropper to break the code than for the parties to communicate, but Merkle puzzles do not provide the enormous qualitative differences in difficulty that are required for (and define) security in modern cryptography. Suppose that the number of puzzles sent by Bob is ''m'', and it takes both Bob and Alice ''n'' steps of computation to solve one puzzle. Then both can deduce a common session key within a time complexity of O(''m+n''). Eve, in contrast, is required to solve all puzzles, which takes her O(''mn'') of time. If ''m'' ≈ ''n'', the effort for Eve has roughly quadratic complexity compared to Alice and Bob, i.e., her computation time is on the order of the square of theirs. ''n'' should thus be selected large enough such that computation is still feasible for Alice and Bob while it surmounts the capabilities of Eve. Quadratic complexity is typically not considered secure enough against an attacker (or on the other extreme, for large m,n, convenient enough for the participants) for practical real-world cryptographic applications. However, this scheme has the distinction of being one of the first examples of
public-key Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
cryptography, and was an inspiration for the Diffie-Hellman key exchange protocol, which has much higher complexity, relying on the
discrete logarithm problem In mathematics, for given real numbers ''a'' and ''b'', the logarithm log''b'' ''a'' is a number ''x'' such that . Analogously, in any group ''G'', powers ''b'k'' can be defined for all integers ''k'', and the discrete logarithm log''b' ...
. In 2008
Boaz Barak Boaz Barak (בועז ברק, born 1974) is an Israeli-American professor of computer science at Harvard University. Early life and education He graduated in 1999 with a B.Sc. in mathematics and computer science from Tel Aviv University. In 2004, ...
and Mohammad Mahmoody-Ghidary showed
"Merkle Puzzles Are Optimal"
that this quadratic bound cannot be improved upon.


References

* {{cite journal , doi = 10.1145/359460.359473 , first = R. C. , last = Merkle , title = Secure Communications over Insecure Channels , journal = Communications of the ACM , volume = 21 , issue =4 , pages = 294–299 , date=April 1978 , citeseerx = 10.1.1.364.5157 }
[pdf


External links

* Ralph Merkle

A history of the idea and its publication, with an interview from the year 1995, Edited by Arnd Weber * Ralph Merkle, 197
project proposal
for CS 244 at U.C. Berkeley. * Ralph Merkle, Dec. 7, 1975
"Secure Communication Over Insecure Channels"
Key-agreement protocols