More on security of public-key cryptosystems based on chebyshev polynomials

Kai Y. Cheong, Takeshi Koshiba

Research output: Contribution to journalArticle

16 Citations (Scopus)

Abstract

Recently, a public-key cryptosystem based on Chebyshev polynomials has been proposed, but it has been later analyzed and shown insecure. This paper addresses some unanswered questions about the cryptosystem. We deal with the issue of computational precision. This is important for two reasons. Firstly, the cryptosystem is defined on real numbers, but any practical data communication channel can only transmit a limited number of digits. Any real number can only be specified to some precision level, and we study the effect of that. Secondly, we show that the precision issue is related to its security. In particular, the algorithm previously proposed to break the cryptosystem may not work in some situations. Moreover, we introduce another method to break the cryptosystem with general precision settings. We extend the method to show that a certain class of cryptosystems is insecure. Our method is based on the known techniques on the shortest vector problem in lattice and linear congruences.

Original languageEnglish
Pages (from-to)795-799
Number of pages5
JournalIEEE Transactions on Circuits and Systems II: Express Briefs
Volume54
Issue number9
DOIs
Publication statusPublished - 2007
Externally publishedYes

Fingerprint

Cryptography
Polynomials

Keywords

  • Chaos-based cryptography
  • Chebyshev polynomials
  • key agreement
  • public-key cryptography

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

More on security of public-key cryptosystems based on chebyshev polynomials. / Cheong, Kai Y.; Koshiba, Takeshi.

In: IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 54, No. 9, 2007, p. 795-799.

Research output: Contribution to journalArticle

@article{38da0b401fce4d7a82f823d9c7182a1d,
title = "More on security of public-key cryptosystems based on chebyshev polynomials",
abstract = "Recently, a public-key cryptosystem based on Chebyshev polynomials has been proposed, but it has been later analyzed and shown insecure. This paper addresses some unanswered questions about the cryptosystem. We deal with the issue of computational precision. This is important for two reasons. Firstly, the cryptosystem is defined on real numbers, but any practical data communication channel can only transmit a limited number of digits. Any real number can only be specified to some precision level, and we study the effect of that. Secondly, we show that the precision issue is related to its security. In particular, the algorithm previously proposed to break the cryptosystem may not work in some situations. Moreover, we introduce another method to break the cryptosystem with general precision settings. We extend the method to show that a certain class of cryptosystems is insecure. Our method is based on the known techniques on the shortest vector problem in lattice and linear congruences.",
keywords = "Chaos-based cryptography, Chebyshev polynomials, key agreement, public-key cryptography",
author = "Cheong, {Kai Y.} and Takeshi Koshiba",
year = "2007",
doi = "10.1109/TCSII.2007.900875",
language = "English",
volume = "54",
pages = "795--799",
journal = "IEEE Transactions on Circuits and Systems II: Express Briefs",
issn = "1549-7747",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "9",

}

TY - JOUR

T1 - More on security of public-key cryptosystems based on chebyshev polynomials

AU - Cheong, Kai Y.

AU - Koshiba, Takeshi

PY - 2007

Y1 - 2007

N2 - Recently, a public-key cryptosystem based on Chebyshev polynomials has been proposed, but it has been later analyzed and shown insecure. This paper addresses some unanswered questions about the cryptosystem. We deal with the issue of computational precision. This is important for two reasons. Firstly, the cryptosystem is defined on real numbers, but any practical data communication channel can only transmit a limited number of digits. Any real number can only be specified to some precision level, and we study the effect of that. Secondly, we show that the precision issue is related to its security. In particular, the algorithm previously proposed to break the cryptosystem may not work in some situations. Moreover, we introduce another method to break the cryptosystem with general precision settings. We extend the method to show that a certain class of cryptosystems is insecure. Our method is based on the known techniques on the shortest vector problem in lattice and linear congruences.

AB - Recently, a public-key cryptosystem based on Chebyshev polynomials has been proposed, but it has been later analyzed and shown insecure. This paper addresses some unanswered questions about the cryptosystem. We deal with the issue of computational precision. This is important for two reasons. Firstly, the cryptosystem is defined on real numbers, but any practical data communication channel can only transmit a limited number of digits. Any real number can only be specified to some precision level, and we study the effect of that. Secondly, we show that the precision issue is related to its security. In particular, the algorithm previously proposed to break the cryptosystem may not work in some situations. Moreover, we introduce another method to break the cryptosystem with general precision settings. We extend the method to show that a certain class of cryptosystems is insecure. Our method is based on the known techniques on the shortest vector problem in lattice and linear congruences.

KW - Chaos-based cryptography

KW - Chebyshev polynomials

KW - key agreement

KW - public-key cryptography

UR - http://www.scopus.com/inward/record.url?scp=34648828809&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=34648828809&partnerID=8YFLogxK

U2 - 10.1109/TCSII.2007.900875

DO - 10.1109/TCSII.2007.900875

M3 - Article

AN - SCOPUS:34648828809

VL - 54

SP - 795

EP - 799

JO - IEEE Transactions on Circuits and Systems II: Express Briefs

JF - IEEE Transactions on Circuits and Systems II: Express Briefs

SN - 1549-7747

IS - 9

ER -