On the use of RSA as a secret key cryptosystem

被引:6
|
作者
Brincat, K [1 ]
机构
[1] Univ London, Dept Math, Informat Secur Grp, Egham TW20 0EX, Surrey, England
关键词
unidirectional keys; modular exponentiation; RSA;
D O I
10.1023/A:1008354524654
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One fundamental difference between the use of symmetric and public key cryptosystems is that the former requires trust between sender and receiver. Typically they will share a secret key and neither has any protection from the other. However, many users are now finding that they want keys to be used for 'one purpose only' and are relying on hardware functionality to introduce the concept of unidirectional keys for symmetric algorithms. (So, for instance, the hardware functionality might ensure that a key used for encrypting messages from user A to user B cannot be used for encrypting messages in the opposite direction.) For public key systems this concept of unidirectional keys is automatically satisfied. However, when the encrypting key is made public, the exposure of this key means that the deciphering key is only safe from compromise when the keys are very large. If, on the other hand, both keys were kept secret then it might be possible to use much smaller keys. In this paper we investigate ways of using the primitives of an RSA public key cryptosystem in a symmetric key 'setting' i.e. where neither key is made public.
引用
收藏
页码:317 / 329
页数:13
相关论文
共 50 条
  • [21] FAST DECIPHERMENT ALGORITHM FOR RSA PUBLIC-KEY CRYPTOSYSTEM
    QUISQUATER, JJ
    COUVREUR, C
    ELECTRONICS LETTERS, 1982, 18 (21) : 905 - 907
  • [22] An efficient VLSI architecture for RSA public-key cryptosystem
    Chiang, JS
    Chen, JK
    ISCAS '99: PROCEEDINGS OF THE 1999 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 1: VLSI, 1999, : 496 - 499
  • [23] A SEMANTICALLY SECURE PUBLIC-KEY CRYPTOSYSTEM BASED ON RSA
    Romankov, V. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 29 (03): : 32 - 40
  • [24] An EHSA for RSA Cryptosystem
    Kumari, Manisha
    Ekka, Deeksha
    Yadav, Nishi
    ADVANCES IN DATA AND INFORMATION SCIENCES, ICDIS 2017, VOL 2, 2019, 39 : 375 - 385
  • [25] A Novel and Efficient Design for an RSA Cryptosystem With a Very Large Key Size
    Huang, Xinming
    Wang, Wei
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2015, 62 (10) : 972 - 976
  • [26] Fast parallel exponentiation algorithm for RSA public-key cryptosystem
    Wu, Chia-Long
    Lou, Der-Chyuan
    Lai, Jui-Chang
    Chang, Te-Jen
    INFORMATICA, 2006, 17 (03) : 445 - 462
  • [27] AAβ Public Key Cryptosystem - A Comparative Analysis Against RSA and ECC
    Ariffin, M. R. K.
    Mahad, Z.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 589 - 594
  • [28] New probabilistic public-key encryption based on the RSA cryptosystem
    Roman'kov, Vitalii A.
    GROUPS COMPLEXITY CRYPTOLOGY, 2015, 7 (02) : 153 - 156
  • [29] Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem
    Jain, Ashish
    Bansal, Sulabh
    Das, Nripendra Narayan
    Gupta, Shyam Sunder
    Soft Computing, 2024, 28 (17-18) : 10569 - 10582
  • [30] A faster modular multiplication based on key size partitioning for RSA public-key cryptosystem
    Lee, SY
    Jeong, YJ
    Kwon, OJ
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2002, E85D (04) : 789 - 791