Security of Public-Key Cryptosystems Based on Chebyshev Polynomials over the Residue Ring Z/pkZ

被引:0
|
作者
Yoshioka, Daisaburo [1 ]
机构
[1] Sojo Univ, Dept Comp & Informat Sci, Nishi Ku, 4-22-1 Ikeda, Kumamoto 8600082, Japan
关键词
ALGORITHM;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, a public-key cryptosystem using Chebyshev polynomials defined on a finite set has been proposed. The security of the cryptosystem depends on the difficulty of finding the degree of Chebyshev polynomials from given parameters. In this paper, we propose an algorithm to find the degree of Chebyshev polynomials modulo a prime power. The result shows that the cryptosystem based on Chebyshev polynomials modulo a prime power is insecure unless a huge prime is used.
引用
收藏
页数:4
相关论文
共 50 条
  • [31] An Encryption Algorithm Based on Public-Key Cryptosystems for Vector Map
    Tan, Tao
    Zhang, Liming
    Liu, Shuaikang
    Wang, Lei
    SECURITY AND PRIVACY, 2025, 8 (01):
  • [32] Group ring based public key cryptosystems
    Mittal, Gaurav
    Kumar, Sunil
    Narain, Shiv
    Kumar, Sandeep
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06): : 1683 - 1704
  • [33] Public-key cryptosystems based on cubic finite field extensions
    Gong, G
    Harn, L
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (07) : 2601 - 2605
  • [34] On Public-key Encryption Scheme Based on Chebyshev Maps
    Zhang, Linhua
    Mao, Xiuli
    Duan, Wanyu
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1110 - 1114
  • [36] Public key encryption algorithm based on Chebyshev polynomials over finite fields
    Ning Hongzhou
    Liu Yun
    He Dequan
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2538 - +
  • [37] Trapdoor permutation polynomials of Z/nZ and public key cryptosystems (Extended abstract)
    Castagnos, Guilhem
    Vergnaud, Damien
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 333 - +
  • [38] Content-based image watermarking via public-key cryptosystems
    Dai, H. K.
    Yeh, C. -T.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 1, PROCEEDINGS, 2007, 4705 : 937 - +
  • [39] Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack
    Nasako, Takeshi
    Murakami, Yasuyuki
    Kasahara, Masao
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (10) : 2889 - 2892
  • [40] A public-key threshold cryptosystem based on residue rings
    Deacon, Stephanie
    Duenez, Eduardo
    Iovino, Jose
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (04): : 559 - 571