Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ

被引:9
作者
Yoshioka, Daisaburo [1 ]
机构
[1] Sojo Univ, Dept Comp & Informat Sci, Kumamoto 8600082, Japan
关键词
Chebyshev approximation; Public key cryptography; Protocols; Circuits and systems; Indexes; Chebyshev polynomials; sequences; commutative polynomials; public-key cryptography; ALGORITHM;
D O I
10.1109/TCSII.2019.2954855
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A public-key cryptosystem using Chebyshev polynomials defined on a finite set has recently been developed, which is a kind of chaos-based cryptography. The security of this cryptosystem relies on the difficulty of finding the degree of Chebyshev polynomials from given parameters. In this brief, we propose polynomial time algorithms to identify the degree of Chebyshev polynomials modulo a prime power. We demonstrate that the cryptosystem based on Chebyshev polynomials modulo a prime power is not secure. This result also means that there are no commutative polynomials for constructing public-key cryptosystems modulo a prime power.
引用
收藏
页码:2204 / 2208
页数:5
相关论文
共 50 条
  • [21] Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems
    Jiang, Haodong
    Han, Jiang
    Zhang, Zhenfeng
    Ma, Zhi
    Wang, Hong
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5069 - 5081
  • [22] Provably secure public key cryptosystem based on chebyshev polynomials
    Yan, Shijie
    Zhen, Ping
    Min, Lequan
    Journal of Communications, 2015, 10 (06): : 380 - 384
  • [23] An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
    Zhang, Chunfu
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    SYMMETRY-BASEL, 2024, 16 (03):
  • [24] Group ring based public key cryptosystems
    Mittal, Gaurav
    Kumar, Sunil
    Narain, Shiv
    Kumar, Sandeep
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06) : 1683 - 1704
  • [25] Selective opening security of practical public-key encryption schemes
    Heuer, Felix
    Jager, Tibor
    Schaege, Sven
    Kiltz, Eike
    IET INFORMATION SECURITY, 2016, 10 (06) : 304 - 318
  • [26] Public key cryptosystems based on drinfeld modules are insecure
    Scanlon, T
    JOURNAL OF CRYPTOLOGY, 2001, 14 (04) : 225 - 230
  • [27] Public key cryptosystems based on boolean permutations and their applications
    Wu, CK
    Varadharajan, V
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2000, 74 (02) : 167 - 184
  • [28] An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials
    Zhang, Chunfu
    Bai, Jing
    Liang, Yanchun
    Tavares, Adriano
    Wang, Lidong
    Gomes, Tiago
    Pinto, Sandro
    ALGORITHMS, 2024, 17 (09)
  • [29] Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
    Carl Löndahl
    Thomas Johansson
    Masoumeh Koochak Shooshtari
    Mahmoud Ahmadian-Attari
    Mohammad Reza Aref
    Designs, Codes and Cryptography, 2016, 80 : 359 - 377
  • [30] Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements
    Kong, Yinan
    Lai, Yufeng
    2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, : 1039 - 1042