Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ

被引:11
作者
Yoshioka, Daisaburo [1 ]
机构
[1] Sojo Univ, Dept Comp & Informat Sci, Kumamoto 8600082, Japan
关键词
Chebyshev approximation; Public key cryptography; Protocols; Circuits and systems; Indexes; Chebyshev polynomials; sequences; commutative polynomials; public-key cryptography; ALGORITHM;
D O I
10.1109/TCSII.2019.2954855
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A public-key cryptosystem using Chebyshev polynomials defined on a finite set has recently been developed, which is a kind of chaos-based cryptography. The security of this cryptosystem relies on the difficulty of finding the degree of Chebyshev polynomials from given parameters. In this brief, we propose polynomial time algorithms to identify the degree of Chebyshev polynomials modulo a prime power. We demonstrate that the cryptosystem based on Chebyshev polynomials modulo a prime power is not secure. This result also means that there are no commutative polynomials for constructing public-key cryptosystems modulo a prime power.
引用
收藏
页码:2204 / 2208
页数:5
相关论文
共 50 条
[21]   Practical Algorithm Substitution Attacks on Real-World Public-Key Cryptosystems [J].
Jiang, Haodong ;
Han, Jiang ;
Zhang, Zhenfeng ;
Ma, Zhi ;
Wang, Hong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 :5069-5081
[22]   Provably secure public key cryptosystem based on chebyshev polynomials [J].
Yan, Shijie ;
Zhen, Ping ;
Min, Lequan .
Journal of Communications, 2015, 10 (06) :380-384
[23]   An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA [J].
Zhang, Chunfu ;
Liang, Yanchun ;
Tavares, Adriano ;
Wang, Lidong ;
Gomes, Tiago ;
Pinto, Sandro .
SYMMETRY-BASEL, 2024, 16 (03)
[24]   Group ring based public key cryptosystems [J].
Mittal, Gaurav ;
Kumar, Sunil ;
Narain, Shiv ;
Kumar, Sandeep .
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06) :1683-1704
[25]   Selective opening security of practical public-key encryption schemes [J].
Heuer, Felix ;
Jager, Tibor ;
Schaege, Sven ;
Kiltz, Eike .
IET INFORMATION SECURITY, 2016, 10 (06) :304-318
[26]   Public key cryptosystems based on drinfeld modules are insecure [J].
Scanlon, T .
JOURNAL OF CRYPTOLOGY, 2001, 14 (04) :225-230
[27]   Public key cryptosystems based on boolean permutations and their applications [J].
Wu, CK ;
Varadharajan, V .
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2000, 74 (02) :167-184
[28]   An Improved Multi-Chaotic Public Key Algorithm Based on Chebyshev Polynomials [J].
Zhang, Chunfu ;
Bai, Jing ;
Liang, Yanchun ;
Tavares, Adriano ;
Wang, Lidong ;
Gomes, Tiago ;
Pinto, Sandro .
ALGORITHMS, 2024, 17 (09)
[29]   Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension [J].
Carl Löndahl ;
Thomas Johansson ;
Masoumeh Koochak Shooshtari ;
Mahmoud Ahmadian-Attari ;
Mohammad Reza Aref .
Designs, Codes and Cryptography, 2016, 80 :359-377
[30]   Low latency modular multiplication for public-key cryptosystems using a scalable array of parallel processing elements [J].
Kong, Yinan ;
Lai, Yufeng .
2013 IEEE 56TH INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2013, :1039-1042