Increasing security to public key cryptography for point-to-point communication

被引:1
作者
Somsuk, Kritsanapong [1 ]
Sanemueang, Chalida [2 ]
机构
[1] Udon Thani Rajabhat Univ, UDRU, Fac Technol, Dept Comp & Commun Engn, Udon Thani 41000, Thailand
[2] Udon Thani Rajabhat Univ, UDRU, Off Acad Resources & Informat Technol, Udon Thani 41000, Thailand
关键词
RSA; Chebyshev maps; IFP; CMDL; DLP;
D O I
10.1080/09720529.2021.1930656
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In the beginning of 2020, the new idea of public key cryptography was proposed. This method is from the combining between RSA and Chebyshev maps. It is very difficult to break this system because it is based on both of Integer Factorization Problem (IFP) and Chaotic maps Discrete Logarithm Problem (CMDL). However, Chebyshev polynomials taking many computation costs (many modular multiplications and modular subtraction operations) are the equation to find the result of Chebyshev maps. In this paper, the new improvement of public-key cryptography is proposed for point-to-point communication. The main key is to reduce time and increase the security level. In fact, time is reduced by replacing some Chebyshev maps with modular exponentiation equations using only modular multiplication processes. In addition, the security level can be increased, because it is based on three problems, IFP, CMDL and Discrete Logarithm Problem (DLP). Although, DLP is included in the proposed method, it does not affect the computation time in both of encryption and decryption sides, because DLP is selected to exchange the RSA's public key. The experimental results show that time can be reduced in both sides especially in decryption side. The reason is that the private key of the compared method must be assigned too large, it is larger than the traditional RSA's private key. On the other hand, the private key for the proposed method is similar to RSA's private key.
引用
收藏
页码:215 / 229
页数:15
相关论文
共 19 条
[1]   Cryptanalysis of a discrete-time synchronous chaotic encryption system [J].
Arroyo, David ;
Alvarez, Gonzalo ;
Li, Shujun ;
Li, Chengqing ;
Nunez, Juana .
PHYSICS LETTERS A, 2008, 372 (07) :1034-1039
[2]   Performance Analysis of 128-bit Modular Inverse Based Extended Euclidean Using Altera FPGA Kit [J].
Asad, Mohammad M. ;
Marouf, Ibrahim ;
Abu Al-Haija, Qasem ;
AlShuaibi, Abdullah .
10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 :543-548
[3]  
Buchman J.A., 2004, INTRO CRYPTOGRAPHY
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]   Computing AES related-key differential characteristics with constraint programming [J].
Gerault, David ;
Lafourcade, Pascal ;
Minier, Marine ;
Solnon, Christine .
ARTIFICIAL INTELLIGENCE, 2020, 278 (278)
[6]   User Profiling for University Recommender System using Automatic Information Retrieval [J].
Kanoje, Sumitkumar ;
Mukhopadhyay, Debajyoti ;
Girase, Sheetal .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :5-12
[7]   Anti-synchronization phenomenon of discrete chaotic maps using linear transformations [J].
Khan, Mohammad Ali ;
Mazumdar, Himadri Pai ;
Jabeen, Syeda Darakhshan .
JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2020, 41 (08) :1757-1769
[8]   Efficient AES implementation on Sunway TaihuLight supercomputer: A systematic approach [J].
Li, Liandeng ;
Fang, Jiarui ;
Jiang, Jinlei ;
Gan, Lin ;
Zheng, Weijie ;
Fu, Haohuan ;
Yang, Guangwen .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2020, 138 :178-189
[9]  
Nibouche O, 2003, ICECS 2003: PROCEEDINGS OF THE 2003 10TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, P204
[10]  
Pandey G, 2016, PERSPECTIVESCI, V8, P101, DOI 10.1016/j.pisc.2016.04.007