The Quartic Public Key Transformation

نویسندگان

  • Gunjan Talati
  • Subhash C. Kak
چکیده

This paper presents the quartic public key transformation which can be used for public key applications if side information is also used. This extends an earlier work where the cubic transformation was similarly used. Such a transformation can be used in multiparty communications protocols. Introduction Cryptographic transformations may be visualized in locked box or a piggy-bank modes [1], or alternatively as one-way functions or puzzles [2],[3],[4], or as unitary transformations in quantum states [5],[6]. All these methods are variations on one-to-one mappings of different kinds. In a method that is a departure from these techniques, a three-to-one mapping for cryptography was proposed [7] with the provision that additional side-information will be provided to determine the correct message. This method was a variant of the RSA transformation where the value of the encrypting exponent was taken as 3 and φ(n) (the totient function of the composite number n = pq) was divisible by 3, but not by 9. Clearly, the use of non-one-to-one mappings can make the task of the eavesdropper harder than it would be otherwise. In the RSA transformation the decryption key is calculated by the formula ed=1 mod φ(n). When Alice wants to send a message to Bob, the message to be sent is encrypted by c=me mod n. Bob decrypts the ciphertext using his private key and gets the original message by m=cd mod n=med mod n=m. The cubic public key transformation shows how the cube roots of 1 for a prime p and composite number n = pq is calculated and how the three different values of messages m produces the same cipher c. In some cases, the cube roots are obtained by applying Chinese Remainder Theorem (CRT) although congruences could also be solved by the Aryabhata Algorithm [8],[9]. Cryptography based on extraction of cubic roots from Gaussian Integers is explained in [10]. In this paper, we study quartic public key transformation as an extension of the cubic transformation. We are separately presenting additional results for general power transformations that are not one-to-one. The properties of the quartic transformation We first consider quartic mapping modulo a prime number. For quartic transformation c = m4 mod p, four different values of message m would give the same cipher c, where the value of prime p is given by p = 4k + 1. The quartic roots of 1 would be 1, α, α2 and α3 and they are calculated by solving the equation α4 − 1 = 0 (1) (α − 1)(α3 + α2 + α1 + 1)=0

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalized Public Key Transformations with Side Information

This paper presents results on generalized public key cryptography with exponentials modulo primes and composite numbers where the mapping is not one-to-one and the uniqueness is achieved by additional side information. Such transformations may be used for oblivious transfer and generate events of specific probabilities. Introduction This paper presents generalized public key transformations th...

متن کامل

On the Field Intersection Problem of Quartic Generic Polynomials via Formal Tschirnhausen Transformation

Let k be a field of characteristic 6= 2. We give an answer to the field intersection problem of quartic generic polynomials over k via formal Tschirnhausen transformation and multi-resolvent polynomials.

متن کامل

Integrable Quartic Potentials and Coupled KdV Equations

We show a surprising connection between known integrable Hamiltonian systems with quartic potential and the stationary flows of some coupled KdV systems related to fourth order Lax operators. In particular, we present a connection between the Hirota-Satsuma coupled KdV system and (a generalisation of) the 1 : 6 : 1 integrable case quartic potential. A generalisation of the 1 : 6 : 8 case is sim...

متن کامل

Intuitionistic fuzzy stability of a quadratic and quartic functional equation

In this paper, we prove the generalized Hyers--Ulamstability of a quadratic and quartic functional equation inintuitionistic fuzzy Banach spaces.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1304.4273  شماره 

صفحات  -

تاریخ انتشار 2013