Security of Public-Key Cryptosystems Based on Chebyshev Polynomials Over Z/pkZ

被引:9
作者
Yoshioka, Daisaburo [1 ]
机构
[1] Sojo Univ, Dept Comp & Informat Sci, Kumamoto 8600082, Japan
关键词
Chebyshev approximation; Public key cryptography; Protocols; Circuits and systems; Indexes; Chebyshev polynomials; sequences; commutative polynomials; public-key cryptography; ALGORITHM;
D O I
10.1109/TCSII.2019.2954855
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A public-key cryptosystem using Chebyshev polynomials defined on a finite set has recently been developed, which is a kind of chaos-based cryptography. The security of this cryptosystem relies on the difficulty of finding the degree of Chebyshev polynomials from given parameters. In this brief, we propose polynomial time algorithms to identify the degree of Chebyshev polynomials modulo a prime power. We demonstrate that the cryptosystem based on Chebyshev polynomials modulo a prime power is not secure. This result also means that there are no commutative polynomials for constructing public-key cryptosystems modulo a prime power.
引用
收藏
页码:2204 / 2208
页数:5
相关论文
共 50 条
[41]   Pitfalls in public key cryptosystems based on free partially commutative monoids and groups [J].
Gonzalez Vasco, Maria Isabel ;
Steinwandt, Rainer .
APPLIED MATHEMATICS LETTERS, 2006, 19 (10) :1037-1041
[42]   Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask [J].
Wang, Yuntao ;
Ikematsu, Yasuhiko ;
Yasuda, Takanori .
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2022, 2022, 13600 :88-104
[43]   A new public-key cipher system based upon the diophantine equations - Comment [J].
Blackburn, SR ;
Murphy, S ;
Paterson, KG .
IEEE TRANSACTIONS ON COMPUTERS, 1997, 46 (04) :512-512
[44]   A Public-key Cryptography and A Entity Authentication Scheme Based on Improved Hyperbolic Function [J].
Wang, Dahu ;
Bai, Heyuan ;
Liu, Qunpo ;
Tong, Zhaojing .
IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, :530-533
[45]   Analysis of Quantum Cryptosystems using Key Distribution and Attacking Strategies over Security Protocols [J].
Madaan, Abhishek ;
Raj, Gaurav .
PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE CONFLUENCE 2018 ON CLOUD COMPUTING, DATA SCIENCE AND ENGINEERING, 2018, :710-715
[46]   Combined schemes for signature and encryption: The public-key and the identity-based setting [J].
Gonzalez Vasco, Maria Isabel ;
Hess, Florian ;
Steinwandt, Rainer .
INFORMATION AND COMPUTATION, 2016, 247 :1-10
[47]   An Algorithm Based Fault Tolerant Scheme for Elliptic Curve Public-key Cryptography [J].
Zhang, Chang N. ;
Liu, Xiao Wei .
DEPEND: 2009 SECOND INTERNATIONAL CONFERENCE ON DEPENDABILITY, 2009, :28-33
[48]   A New Public Key Signature Scheme based on Quadratic Polynomials [J].
Yuan, Feng ;
Zhao, Shangwei ;
Ou, Haiwen ;
Xu, Shengwei .
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, :8-11
[49]   Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences [J].
PENG Liqiang ;
ZUO Jinyin ;
HU Lei ;
XU Jun .
Chinese Journal of Electronics, 2014, 23 (01) :175-178
[50]   Analysis of Two Public Key Cryptosystems Based on Randomized Knapsack Sequences [J].
Peng Liqiang ;
Zuo Jinyin ;
Hu Lei ;
Xu Jun .
CHINESE JOURNAL OF ELECTRONICS, 2014, 23 (01) :175-178