A New Public Key Cryptosystem
Files
Date
2018, 2018
Journal Title
Journal ISSN
Volume Title
Publisher
3rd International Conference on Advances in Computing and Technology (ICACT โ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka.
3rd International Conference on Advances in Computing and Technology (ICACT โ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka.
3rd International Conference on Advances in Computing and Technology (ICACT โ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka.
Abstract
In this paper a new CCA secure public key cryptosystem is presented. The introduced cryptosystem is simple and based on the factorization problem. The cryptosystem has two public keys and two private keys. Therefore two encryption algorithms and two decryption algorithms are in this system. Here, we hide the message in a matrix. This situation makes a difficult puzzle for adversaries. In this method, the public encryption key is (e,r,๐), e and r are any prime numbers greater than 2 and less than n, n is a product of two large prime numbers. The decryption key is (d,s,๐). d and s are multiplicative inverses of e modulo ั(n) and r modulo ั(n) respectively. We should select another integer ๐ (< 2๐) and set the message ๐ and ๐ in a 2 โ 2 matrix ๐ as the determinant of X is odd. We encrypt the determinant of the matrix by raising it to the eth power modulo ๐. We also have to send ๐ for the decryption. ๐ is encrypted by raising it to the rth power modulo ๐. When we decrypt the first ciphertext by raising it to another power d modulo ๐ and the second ciphertext by raising it to another power s modulo ๐, we can find the message m. For an example, let ๐ = 7,๐ = 11, ๐ = 23, ๐ = 29. Then, ๐ = ๐๐ = 7 ร 11 = 77,ั(๐) = 60. Then for the private keys, ๐ = 47 and ๐ = 29. Let the message, ๐ = 30 and ๐ = 7. Then, ๐ =
(
30 7 1 2
). From the encryption equations, ๐ถ1 โก [๐๐๐ก๐๐๐๐๐๐๐๐ก(๐)๐] ๐๐๐ ๐ โก 5323 ๐๐๐ 77 โก 58 and ๐ถ2 โก [๐๐] ๐๐๐ ๐ โก 729 ๐๐๐ 77 โก 63. The decryption equations are Determinant (๐) โก [๐ถ1๐] ๐๐๐ ๐ โก 5847 ๐๐๐ 77 โก 53 and ๐ โก [๐ถ2๐ ] ๐๐๐ ๐ โก 6329 ๐๐๐ 77 โก 7. Then, using 2๐ โ ๐ = Determinant (๐), we can find ๐ = 30. If we use the fast exponentiation algorithm then the computational complexity of the cryptosystem is in polynomial time. The proposed cryptosystem is OW-CCA2 secure and also can use any standard security model to increase the security.
Description
Keywords
public key cryptosystem, RSA cryptosystem, El-Gamal cryptosystem, IND security
Citation
Dissanayake, W.D.M.G.M. (2018). A New Public Key Cryptosystem. 3rd International Conference on Advances in Computing and Technology (ICACT โ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka. p11.
Dissanayake, W.D.M.G.M. (2018). A New Public Key Cryptosystem. 3rd International Conference on Advances in Computing and Technology (ICACT โ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka. p11.
Dissanayake, W.D.M.G.M. (2018). A New Public Key Cryptosystem. 3rd International Conference on Advances in Computing and Technology (ICACT โ 2018), Faculty of Computing and Technology, University of Kelaniya, Sri Lanka. p11.