Correctness of Li Generalization of RSA Cryptosystem

نویسنده

  • Roman Popovych
چکیده

For given N=pq with p and q different odd primes and natural m Banghe Li introduced the public key cryptosystem [1]. In the case m=1 the system is just the famous RSA public key cryptosystem [2]. The cryptosystem is more secure in general [2] than RSA system. But one has to solve a few problems connected with the introduced cryptosystem. The cryptosystem works with elements of the quotient ring ZN[x]/(h(x)). To construct the system it is necessary to calculate a number φ(N,h) of units of the ring. If polynomial h(x) is special to N, then formula for φ(N,h) is given in [1], but it is not simple to verify if h(x) is special. In general formulas for φ(N,h) are not known. For degree m=2 of the polynomial h(x) formulas for the number φ(N,h) are given in [1]. A question of correctness of the cryptosystem emerges even in the simplest case m=2. We answer positively the Li’s question about correctness of the system in this case.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generalizations of RSA Public Key Cryptosystem

In this paper, for given N = pq with p and q different odd primes, and m = 1, 2, · · · , we give a public key cryptosystem. When m = 1 the system is just the famous RSA system. And when m ≥ 2, the system is usually more secure than the one with m = 1.

متن کامل

Moduli for Testing Implementations of the RSA Cryptosystem

Comprehensive testing of any implementation of the RSA cryptosystem requires the use of a number of moduli with specific properties. It is shown how to generate a sufficient variety of these to enable testing which will justify high confidence in the correctness of both the design and the operation of hardware implementations. The tests avoid the necessity of another implementation for comparis...

متن کامل

Petr Jančar FEI

1 RSA-cryptosystem, and the underlying theory The aim of this section is to recall the RSA cryptographic method and the necessary theory showing its correctness, computational complexity, etc. 1.1 Creating an RSA system RSA (Rivest, Shamir, Adleman) is a particular method which can be used for the public-key cryptography. A concrete RSA system is created as follows: 1. Choose randomly two diffe...

متن کامل

Selected Topics of Theoretical Computer Science ( Vybrané partie z teoretické informatiky , 460 - 4043 ) Part

1 RSA-cryptosystem, and the underlying theory The aim of this section is to recall the RSA cryptographic method and the necessary theory showing its correctness, computational complexity, etc. 1.1 Creating an RSA system RSA (Rivest, Shamir, Adleman) is a particular method which can be used for the public-key cryptography. A concrete RSA system is created as follows: 1. Choose randomly two diffe...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2009  شماره 

صفحات  -

تاریخ انتشار 2009