Anna M. Johnston
Sandia National Laboratories
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Anna M. Johnston.
Journal of Cryptology | 2002
Anna M. Johnston; Peter S. Gemmell
Abstract. The standard Diffie—Hellman key exchange is suseptible to an attack known as the man-in-the-middle attack. Lack of authentication in the protocol makes this attack possible. Adding separate authentication to the protocol solves the problem but adds extra transmission and computation costs. Protocols which combine the authentication with the key exchange (an authenticated key exchange) are more efficient but until now none were provably secure against the man-in-the-middle attack. This paper describes an authenticated key exchange based on the difficulty of the q th-root problem, a problem believed to be equivalent to the discrete logarithm problem over groups of order q2 (where q is a large prime) and parallel to the square-root problem over the ring modulo N , where N is a strong two prime composite integer. We show that mounting a man-in-the-middle attack for our protocol is equivalent to breaking the Diffie—Hellman problem in the group.
international conference on information and communication security | 1999
Cheryl L. Beaver; Peter S. Gemmell; Anna M. Johnston; William Douglas Neumann
We show that, for a prime q and a group G, if ord(G) = q k r, k>1, and r is smooth, then finding a q th root in G, is equivalent to the discrete logarithm problem over G (note that the discrete logarithm problem over the group G reduces to the discrete logarithm problem over a subgroup of order q – see reference [5]). Several publications describe techniques for computing q th roots (see [3] and [1]). All have the stated or implied requirement of computing discrete logarithm in a subgroup of order q.
Archive | 2003
Elebeoba E. May; Mark Daniel Rintoul; Anna M. Johnston; Richard J. Pryor; William E. Hart; Jean-Paul Watson
IACR Cryptology ePrint Archive | 2001
Anna M. Johnston
IACR Cryptology ePrint Archive | 2001
Peter S. Gemmell; Anna M. Johnston
symposium on discrete algorithms | 1999
Anna M. Johnston
IACR Cryptology ePrint Archive | 2017
Anna M. Johnston
IACR Cryptology ePrint Archive | 2017
Anna M. Johnston
Proposed for publication in IEEE Engineering in Medicine and Biology Magazine. | 2005
Elebeoba E. May; Anna M. Johnston
Archive | 2005
Mark Daniel Rintoul; Elebeoba E. May; William Michael Brown; Anna M. Johnston; Jean-Paul Watson