Professional Documents
Culture Documents
Theory
Ashish Agarwala
R Saravanan
1.
INTRODUCTION
c
978-1-4673-0255-5/12/$31.00 2012
IEEE
Key Generation
Public Key
Distribution
Channel
Public Keys ()
Private Keys ()
Sender
Cipher
Text
Plaintext
Encryption ()
Decryption ()
Plaintext
238
II.
(1)
a k* (n) *a r a r mod n,
a k* (n) + r a r mod n
(2)
The above observation forms the basis of the proposed publickey cryptosystem.
y=f(x)
A. Proposed Public-Key-Cryptosystem
f
x
Bob
f -1
Set A
Set B
Domain
Range
(d, y, n)
Select p,q
n = p*q
(n) = (p-1)*(q-1)
Select r where 1 r < (n)
Select e where 1<e< (n)
&gcd (e, (n)) =1
Select d where ed r mod(n)
Select b where b<n
bd y mod n
Public
Key Generation
Alice
Private
(d, y, n)
(e, b, r, n)
C: Ciphertext
P
CT = (Pd* y) mod n
P= Ce mod n
P = (P)1/r
P = P/b
Plaintext
P
Plaintext
239
(3)
C. Encryption
The encryption procedure uses exponentiation and
multiplication. Anyone can send a message to Bob using his
public keys (d, y, n).The size of the plaintext must be much
smaller than n, which means if the size of the plaintext is
larger than modulus n, it should be divided into blocks.
Encryption_Pseudocode
{
CT (PTd* y) mod n
}
where PT=plaintext, CT=cipher text
D. Decryption
The decryption procedure uses exponentiation as well as
division. Bob can decrypt the cipher text received using the
decryption algorithm. It consists of three steps. To get the
cipher text back the cipher text must be much smaller than the
modulus n.
Decryption_Pseudocode
{
PT CTe mod n
PT (PT)1/r
PT PT/b
}
240
III. PROOF
In the proposed cryptosystem the decryption expression Ce
mod n can be verified to be plaintext P, through substitutions:
Ce mod n= (Pd *y)e mod n= (Pd*bd)e mod n= (P*b)r mod n
Therefore, after the first step of the decryption
P= (P*b)r mod n
Now substituting P in Step2 of decryption:
P= (P)1/r mod n = (P*b)r *1/r mod n= (P*b) mod n
After substituting P in Step3 of decryption:
P=P/b= (P*b)/b mod n=P mod n
IV. CONCLUSION AND REMARKS
The working of the algorithm is based on the careful selection
of the parameters specified. Values of p and q should be large
enough to make the modulus n very large. Values of b and r
should be such that br is much smaller than n. To ensure br is
smaller than n, b should be much smaller than n and r should
be much smaller than (n). We will get the plaintext back
only when the plaintext, Pr multiplied with br does not exceed
the modulus n. Therefore, b and r should be carefully selected
to get the plaintext back after decryption. To launch an attack
V. REFERENCES
[1]
[2]
[3]
[4]
[5]
241