Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ

被引:9
作者
Yoshioka, Daisaburo [1 ]
机构
[1] Sojo Univ, Dept Comp & Informat Sci, Kumamoto 8600082, Japan
关键词
Chebyshev approximation; Public key cryptography; Protocols; Circuits and systems; Indexes; Chebyshev polynomials; sequences; commutative polynomials; public-key cryptography; ALGORITHM;
D O I
10.1109/TCSII.2019.2954855
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A public-key cryptosystem using Chebyshev polynomials defined on a finite set has recently been developed, which is a kind of chaos-based cryptography. The security of this cryptosystem relies on the difficulty of finding the degree of Chebyshev polynomials from given parameters. In this brief, we propose polynomial time algorithms to identify the degree of Chebyshev polynomials modulo a prime power. We demonstrate that the cryptosystem based on Chebyshev polynomials modulo a prime power is not secure. This result also means that there are no commutative polynomials for constructing public-key cryptosystems modulo a prime power.
引用
收藏
页码:2204 / 2208
页数:5
相关论文
共 50 条
  • [31] A Framework for Automatic Security Proof of public-key cryptography in Computational Model
    Guang Yan
    Fei Jin-Long
    Gu Chun-Xiang
    Zhu Yue-Fei
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 882 - 886
  • [32] Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension
    Londahl, Carl
    Johansson, Thomas
    Shooshtari, Masoumeh Koochak
    Ahmadian-Attari, Mahmoud
    Aref, Mohammad Reza
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (02) : 359 - 377
  • [33] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535
  • [34] Structural Attacks for Public Key Cryptosystems based on Gabidulin Codes
    R. Overbeck
    [J]. Journal of Cryptology, 2008, 21 : 280 - 301
  • [35] Structural attacks for public key cryptosystems based on Gabidulin codes
    Overbeck, R.
    [J]. JOURNAL OF CRYPTOLOGY, 2008, 21 (02) : 280 - 301
  • [36] Memory-Tight Multi-challenge Security of Public-Key Encryption
    Jaeger, Joseph
    Kumar, Akshaya
    [J]. ADVANCES IN CRYPTOLOGY-ASIACRYPT 2022, PT III, 2022, 13793 : 454 - 484
  • [37] FPGA based hardware acceleration for elliptic curve public key cryptosystems
    Ernst, M
    Henhapl, B
    Klupsch, S
    Huss, S
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2004, 70 (03) : 299 - 313
  • [38] Weak-Keys in Public Key Cryptosystems Based on Discrete Logarithms
    戴瑞恩
    罗平
    彭小宁
    王道顺
    [J]. Tsinghua Science and Technology, 2005, (05) : 579 - 581
  • [39] Design of Public-Key Algorithms Based on Partial Homomorphic Encryptions
    Nayyef, Marwan Majeed
    Sagheer, Ali Makki
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2019, 13 (02) : 67 - 85
  • [40] Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
    Beckmann, Nathan
    Potkonjak, Miodrag
    [J]. INFORMATION HIDING, 2009, 5806 : 206 - +