Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Anna M. Johnston is active.

Publication


Featured researches published by Anna M. Johnston.


Journal of Cryptology | 2002

Authenticated Key Exchange Provably Secure Against the Man-in-the-Middle Attack

Anna M. Johnston; Peter S. Gemmell

Abstract. The standard Diffie—Hellman key exchange is suseptible to an attack known as the man-in-the-middle attack. Lack of authentication in the protocol makes this attack possible. Adding separate authentication to the protocol solves the problem but adds extra transmission and computation costs. Protocols which combine the authentication with the key exchange (an authenticated key exchange) are more efficient but until now none were provably secure against the man-in-the-middle attack. This paper describes an authenticated key exchange based on the difficulty of the q th-root problem, a problem believed to be equivalent to the discrete logarithm problem over groups of order q2 (where q is a large prime) and parallel to the square-root problem over the ring modulo N , where N is a strong two prime composite integer. We show that mounting a man-in-the-middle attack for our protocol is equivalent to breaking the Diffie—Hellman problem in the group.


international conference on information and communication security | 1999

On the Cryptographic Value of The qth Root Problem

Cheryl L. Beaver; Peter S. Gemmell; Anna M. Johnston; William Douglas Neumann

We show that, for a prime q and a group G, if ord(G) = q k r, k>1, and r is smooth, then finding a q th root in G, is equivalent to the discrete logarithm problem over G (note that the discrete logarithm problem over the group G reduces to the discrete logarithm problem over a subgroup of order q – see reference [5]). Several publications describe techniques for computing q th roots (see [3] and [1]). All have the stated or implied requirement of computing discrete logarithm in a subgroup of order q.


Archive | 2003

Detection and reconstruction of error control codes for engineered and biological regulatory systems.

Elebeoba E. May; Mark Daniel Rintoul; Anna M. Johnston; Richard J. Pryor; William E. Hart; Jean-Paul Watson


IACR Cryptology ePrint Archive | 2001

Digitally Watermarking RSA Moduli

Anna M. Johnston


IACR Cryptology ePrint Archive | 2001

Analysis of a Subset Sum Randomizer.

Peter S. Gemmell; Anna M. Johnston


symposium on discrete algorithms | 1999

A generalized q th root algorithm

Anna M. Johnston


IACR Cryptology ePrint Archive | 2017

Shor's Algorithm and Factoring: Don't Throw Away the Odd Orders.

Anna M. Johnston


IACR Cryptology ePrint Archive | 2017

Dispersed Cryptography and the Quotient Ring Transform.

Anna M. Johnston


Proposed for publication in IEEE Engineering in Medicine and Biology Magazine. | 2005

Bits and bases, parallel paradigms for communication.

Elebeoba E. May; Anna M. Johnston


Archive | 2005

Deciphering the genetic regulatory code using an inverse error control coding framework.

Mark Daniel Rintoul; Elebeoba E. May; William Michael Brown; Anna M. Johnston; Jean-Paul Watson

Collaboration


Dive into the Anna M. Johnston's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Elebeoba E. May

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Jean-Paul Watson

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Mark Daniel Rintoul

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Cheryl L. Beaver

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Richard J. Pryor

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

William E. Hart

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge