A New Public-Key Cryptosystem

نویسندگان

  • David Naccache
  • Jacques Stern
چکیده

It is striking to observe that two decades after the discovery of public-key cryptography, the cryptographer’s toolbox contains only a dozen of asymmetric encryption schemes. This rarity and the fact that today’s most popular schemes had so far defied all complexity classification a.ttempts strongly motivates the design of new asymmetric cryptosystems. Interestingly, the crypt,ographic community has been relat,ively more successful in the related field of identification, where a user attempts to convince another entity of his identity by means of an on-line communication. For example, there have been several attempts to build identification protocols based on simple operations (see [19, 21, 22, IS]). Although the devising of new public key cryptosystems appears much more difficult (since it deals with trapdoor functions rather than simple one-way functions) we feel that research in this direction is stsill in order : simple yet efficient constructions may have been overlooked and, in a way, the present, paper is an example of such a sitmuation. As observed by [18], most asymmetric encryption schemes present, the following coninion design morphology : Start with an intractable problem P and find an easy instance P[easy] E P which should be solvable in polynomial space and time. 0 Shuffle or scramble P[easy] until the resulting problem P[shuffle] does not resemble P[easy] any more and becomes indistinguishable from P . 0 Publish P[shuffle] and describe how it should be used for encryption. The information s by the means of which P[shuffle] is reduced t o P[easy] is kept as a secret trapdoor. Construct the cryptosystem in such a way that decryption is essentially different for the cryptanalyst and the legitimate receiver, Whilst the former must solve P[shuffle], the latter may use R and solve only P[easy].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Improving the Rao-Nam secret key cryptosystem using regular EDF-QC-LDPC codes

This paper proposes an efficient joint secret key encryption-channel coding cryptosystem, based on regular Extended Difference Family Quasi-Cyclic Low-Density Parity-Check codes. The key length of the proposed cryptosystem decreases up to 85 percent using a new efficient compression algorithm. Cryptanalytic methods show that the improved cryptosystem has a significant security advantage over Ra...

متن کامل

A New Knapsack Public-Key Cryptosystem Based on Permutation Combination Algorithm

A new secure knapsack cryptosystem based on the Merkle-Hellman public key cryptosystem will be proposed in this paper. Although it is common sense that when the density is low, the knapsack cryptosystem turns vulnerable to the low-density attack. The density d of a secure knapsack cryptosystem must be larger than 0 9408 . to avoid low-density attack. In this paper, we investigate a new Permutat...

متن کامل

Cryptanalysis of a New Knapsack Type Public-Key Cryptosystem

— Recently, Hwang et al. introduced a knapsack type public-key cryptosystem. They proposed a new algorithm called permutation combination algorithm. By exploiting this algorithm, they attempt to increase the density of knapsack to avoid the low-density attack. We show that this cryptosystem is not secure, as it based on basic Merkel-Hellman knapsack cryptosystem and because of the superincreasi...

متن کامل

Hybrid encryption/decryption technique using new public key and symmetric key algorithm

This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetrickey cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user’s privacy, authentication and accuracy....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997