An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics
نویسندگان
چکیده
We define an isomorphism between the group of points of a conic and the set of integers modulo a prime equipped with a non-standard product. This product can be efficiently evaluated through the use of Rédei rational functions. We then exploit the isomorphism to construct a novel RSA-like scheme. We compare our scheme with classic RSA and with RSA-like schemes based on the cubic or conic equation. The decryption operation of the proposed scheme turns to be two times faster than RSA, and involves the lowest number of modular inversions with respect to other RSA-like schemes based on curves. Our solution offers the same security as RSA in a one-to-one communication and more security in broadcast applications.
منابع مشابه
A multifactor RSA-like scheme with fast decryption based on Rédei rational functions over the Pell hyperbola
We propose a generalization of an RSA-like scheme based on Rédei rational functions over the Pell hyperbola. Instead of a modulus which is a product of two primes, we define the scheme on a multi-factor modulus, i.e. on a product of more than two primes. This results in a scheme with a decryption which is quadratically faster, in the number of primes factoring the modulus, than the original RSA...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملAn efficient secure channel coding scheme based on polar codes
In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...
متن کامل3 Performance Optimizations
Asymmetric encryption is an integral part of the modern world; it is used to bootstrap secure communication channels and secure storage solutions. The security of encrypted data is built on a sophisticated mathematical theory developed over the last forty years. But building a secure cryptosystem depends on more than just theory. In this class we will take a detailed look at the theory and prac...
متن کاملStudy of McEliece cryptosystem
This report presents a study of the public-key cryptosystem (PKC) proposed by R. J. McEliece in 1978 [25]. The McEliece cryptosystem is based on error-correcting linear codes and is one of the first and so far the most succesful cryptosystem based on notions of coding theory. The original construction in [25] uses binary Goppa codes to encrypt and decrypt messages. Many other variants of the cr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Finite Fields and Their Applications
دوره 39 شماره
صفحات -
تاریخ انتشار 2016