Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ

被引:9
|
作者
Yoshioka, Daisaburo [1 ]
机构
[1] Sojo Univ, Dept Comp & Informat Sci, Kumamoto 8600082, Japan
关键词
Chebyshev approximation; Public key cryptography; Protocols; Circuits and systems; Indexes; Chebyshev polynomials; sequences; commutative polynomials; public-key cryptography; ALGORITHM;
D O I
10.1109/TCSII.2019.2954855
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A public-key cryptosystem using Chebyshev polynomials defined on a finite set has recently been developed, which is a kind of chaos-based cryptography. The security of this cryptosystem relies on the difficulty of finding the degree of Chebyshev polynomials from given parameters. In this brief, we propose polynomial time algorithms to identify the degree of Chebyshev polynomials modulo a prime power. We demonstrate that the cryptosystem based on Chebyshev polynomials modulo a prime power is not secure. This result also means that there are no commutative polynomials for constructing public-key cryptosystems modulo a prime power.
引用
收藏
页码:2204 / 2208
页数:5
相关论文
共 50 条
  • [21] On the security of biquadratic C public-key cryptosystems and its generalizations
    Felke, Patrick
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (03): : 427 - 442
  • [22] Quantum public-key cryptosystems
    Okamoto, T
    Tanaka, K
    Uchiyama, S
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 147 - 165
  • [23] EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS
    DAVIES, DW
    PRICE, WL
    PARKIN, GI
    INFORMATION PRIVACY, 1980, 2 (04): : 138 - 154
  • [24] Relations among security goals of probabilistic public-key cryptosystems
    Suzuki, A
    Kaji, Y
    Watanabe, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 172 - 178
  • [25] Security analysis of the public key algorithm based on Chebyshev polynomials over the integer ring ZN
    Chen, Fei
    Liao, Xiaofeng
    Xiang, Tao
    Zheng, Hongying
    INFORMATION SCIENCES, 2011, 181 (22) : 5110 - 5118
  • [26] Security of GPT-like public-key cryptosystems based on linear rank codes
    Kshevetskiy, Alexander
    PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 143 - +
  • [27] Code-Based Public-Key Cryptosystems and Their Applications
    Kobara, Kazukuni
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55
  • [28] PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE
    Naor, Moni
    Segev, Gil
    SIAM JOURNAL ON COMPUTING, 2012, 41 (04) : 772 - 814
  • [29] Public-Key Cryptosystems Resilient to Key Leakage
    Naor, Moni
    Segev, Gil
    ADVANCES IN CRYPTOLOGY - CRYPTO 2009, 2009, 5677 : 18 - 35
  • [30] Key Distribution for Heterogeneous Public-Key Cryptosystems
    Lv, Xixiang
    Mu, Yi
    Li, Hui
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2013, 15 (05) : 464 - 468