Security of public-key cryptosystems based on Chebyshev polynomials

被引:250
作者
Bergamo, P [1 ]
D'Arco, P
De Santis, A
Kocarev, L
机构
[1] Univ Salerno, Dipartimento Informat & Applicaz, I-84081 Baronissi, Italy
[2] Univ Calif San Diego, Inst Nonlinear Sci, La Jolla, CA 92093 USA
基金
美国国家科学基金会;
关键词
chaos theory; Chebyshev polynomials; Jacobian elliptic Chebyshev rational map; public-key cryptography;
D O I
10.1109/TCSI.2005.851701
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper, we study a public-key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystern works on real numbers and is quite efficient. Unfortunately, from our analysis, it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries if the cryptosystem is used for signing messages. Then, we point out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem are not secure due to the aforementioned attack. We close the paper by discussing the issues and the possibilities of constructing public-key cryptosystems on real numbers.
引用
收藏
页码:1382 / 1393
页数:12
相关论文
共 38 条
[1]  
Abramowitz M., 1970, HDB MATH FUNCTIONS
[2]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[3]  
[Anonymous], LECT NOTES COMPUTER
[4]  
Bellare M., 1995, P 1 ACM C COMPUTER C, P62
[5]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V547, P532
[6]  
Blakley G.R., 1979, P 1979 AFIPS NAT COM, V48, P313, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[7]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[8]  
Chor B., 1993, Journal of Cryptology, V6, P87, DOI 10.1007/BF02620136
[9]   PRIVATE COMPUTATIONS OVER THE INTEGERS [J].
CHOR, B ;
GEREBGRAUS, M ;
KUSHILEVITZ, E .
SIAM JOURNAL ON COMPUTING, 1995, 24 (02) :376-386
[10]  
Cormen T. H., Introduction to Algorithms, V2nd