An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
نویسندگان
چکیده
Security of electronic data has become indispensable to today’s global information society, and public-key cryptography, a key element to securing internet communication, has gained increasing interest as a vital subject of research. Numerous public-key cryptosystems have been proposed that use allegedly intractable number theoretic problems as a basis of their security. One example is NICE, introduced in 2000 by Takagi and Paulus, a new cryptosystem with trapdoor decryption based on the relationship between maximal and non-maximal orders in imaginary quadratic number fields. Relying on the intractability of factoring, NICE provides the same security features as RSA, the most prominent of all public-key cryptosystems, but has faster decryption that is especially important in the application of cryptography to devices with small computing power. As the NICE cryptosystem is based on imaginary quadratic fields, a natural question that arises is whether the concept of NICE can also be applied to real quadratic fields. Although the relationship between maximal and non-maximal orders in imaginary quadratic orders is well-known, very little research has been dedicated to non-maximal orders in real quadratic fields. Unlike imaginary quadratic fields, elements of real quadratic class groups are endowed with a semi-group like substructure, the infrastructure, providing an efficient operation on the set of reduced ideals that can potentially be exploited to improve the encryption scheme in an adaptation of NICE to real quadratic fields. In this thesis, we show that the mapping between ideals in the non-maximal and the maximal order which is the key to obtaining fast decryption in NICE, can be extended to real quadratic fields. Furthermore, we present REAL-NICE, an adaptation of the NICE cryptosystem to real quadratic fields. Retaining the same level of security as the original scheme, the new cryptosystem requires a smaller public-key. Moreover, REAL-NICE employs a more flexible encryption scheme than NICE that gives rise for further improvement of the performance of encryption. Apart from an analogue to the NICE encryption algorithm, we introduce the IMS encryption algorithm that utilizes the infrastructure operation to speed up the encryption process. So far, there is only a rigorous security proof for the IMS encryption algorithm for very unfavorable parameter setups. Run times generated by a prototype implemented in C++ are therefore not in favor of the new cryptosystem. They show that a first implementation of the NICE adaptation to real quadratic fields is up to 1.61 times slower than the NICE cryptosystem. However, under reasonable assumptions, the REAL-NICE cryptosystem can clearly outperform its original.
منابع مشابه
A survey of cryptosystems based on imaginary quadratic orders
Since nobody can guarantee that popular public key cryptosystems based on factoring or the computation of discrete logarithms in some group will stay secure forever, it is important to study different primitives and groups which may be utilized if a popular class of cryptosystems gets broken. A promising candidate for a group in which the DL-problem seems to be hard is the class group Cl(∆) of ...
متن کاملFactoring pq with Quadratic Forms: Nice Cryptanalyses
We present a new algorithm based on binary quadratic forms to factor integers of the form N = pq. Its heuristic running time is exponential in the general case, but becomes polynomial when special (arithmetic) hints are available, which is exactly the case for the so-called NICE family of public-key cryptosystems based on quadratic fields introduced in the late 90s. Such cryptosystems come in t...
متن کاملEfficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders
In [14] there is proposed an ElGamal-type cryptosystem based on non-maximal imaginary quadratic orders with trapdoor decryption. The trapdoor information is the factorization of the non-fundamental discriminant ∆p = ∆1p . The NICE-cryptosystem (New Ideal Coset En-cryption) [24,12] is an efficient variant thereof, which uses an element g ∈ Ker(φ−1 Cl ) ⊆ Cl(∆p), where k is random and φ−1 Cl : Cl...
متن کاملFactoring pq2 with Quadratic Forms: Nice Cryptanalyses
We present a new algorithm based on binary quadratic forms to factor integers of the form N = pq. Its heuristic running time is exponential in the general case, but becomes polynomial when special (arithmetic) hints are available, which is exactly the case for the so-called NICE family of public-key cryptosystems based on quadratic fields introduced in the late 90s. Such cryptosystems come in t...
متن کاملAn Efficient NICE-Schnorr-Type Signature Scheme
Recently there was proposed a novel public key cryptosystem [17] based on non-maximal imaginary quadratic orders with quadratic decryption time. This scheme was later on called NICE for New Ideal Coset Encryption [6]. First implementations show that the decryption is as efficient as RSA-encryption with e = 2 +1. It was an open question whether it is possible to construct comparably efficient si...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008