scispace - formally typeset
Open AccessJournal ArticleDOI

Security of public-key cryptosystems based on Chebyshev polynomials

Reads0
Chats0
TLDR
This paper describes an attack which permits to recover the corresponding plaintext from a given ciphertext and points out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem are not secure due to the aforementioned attack.
Abstract
Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper, we study a public-key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis, it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries if the cryptosystem is used for signing messages. Then, we point out that also other primitives, a Diffie-Hellman like key agreement scheme and an authentication scheme, designed along the same lines of the cryptosystem, are not secure due to the aforementioned attack. We close the paper by discussing the issues and the possibilities of constructing public-key cryptosystems on real numbers.

read more

Citations
More filters
Journal ArticleDOI

Cryptanalysis of the public key encryption based on multiple chaotic systems

TL;DR: Experimental result shows Ruanjan’s encryption technique is inefficient, and detailed theoretic analysis shows that the complexity to break the cryptosystem is overestimated.
Journal ArticleDOI

A novel key agreement protocol based on chaotic maps

TL;DR: This work proposes a novel chaotic maps-based key agreement protocol which is proved to be secure, feasible and extensible.
Journal ArticleDOI

Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things

TL;DR: This paper proposes a new secure three-factor user remote user authentication protocol based on the extended chaotic maps and presents the formal security analysis using the both widely accepted real-or-random model and Burrows–Abadi–Needham logic.
Journal ArticleDOI

A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps

TL;DR: A mutual authentication and key agreement scheme for WSN using chaotic maps is proposed, the first to be proposed based on chaotic maps, and the superiority of the proposed scheme over its predecessor schemes is shown by means of detailed security analysis and comparative evaluation.
Journal ArticleDOI

An improved key agreement protocol based on chaos

TL;DR: An enhanced key agreement protocol based on Chebyshev chaotic map is introduced that overcomes the drawbacks of several previously proposed chaotic key agreement protocols and works like Diffie–Hellman algorithm.
References
More filters
Book

Introduction to Algorithms

TL;DR: The updated new edition of the classic Introduction to Algorithms is intended primarily for use in undergraduate or graduate courses in algorithms or data structures and presents a rich variety of algorithms and covers them in considerable depth while making their design and analysis accessible to all levels of readers.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

A method for obtaining digital signatures and public-key cryptosystems

TL;DR: An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key.
Related Papers (5)