Abstract
This paper describes some properties of exponentiation modulo a polynomial and suggests its use for encryption in a mode that can be cryptanalyzed in approximatelyO(pd 3) time, whered is the size of the message frame andp is the prime modulo which the rankwise computations are carried out. While for sufficiently largepd (∼105) this appears to provide a one-way function which can be used in a public-key cryptosystem, we show that since encryption/ decryption effort is defined inO(d 2 logpd log logp) time, a practical application of the proposed algorithm would be either in a secret key or in a tamper-proof, hardwired secret polynomial system.
Similar content being viewed by others
References
W. Diffie and M. E. Hellman, Privacy and authentication: an introduction to cryptography,Proc. IEEE 67:397–427 (March 1979).
G. H. Hardy and E. M. Wright,An Introduction to the Theory of Numbers, Oxford University Press, Oxford (1954).
S. C. Kak, An encryption algorithm modulo a polynomial in GF(p), Technical Report ECE 608, LSU (May 1982).
D. E. Knuth,The Art of Computer Programming, Vol. 2, Addison Wesley, Reading, Massachusetts (1971).
A. Lempel, Cryptology in transition,Computing Surveys 11:285–303 (December 1979).
M. O. Rabin, Probabilistic algorithms in finite fields, Technical Report MIT/LCS/TR-213, MIT (January 1979).
R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems,Commun. ACM 21:120–126 (February 1978).
A. Shamir, A polynomial time algorithm for breaking Merkle-Hellman cryptosystems, inProceedings IEEE Foundations of Computer Science Conference (1982).
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Kak, S.C. Exponentiation modulo a polynomial for data security. International Journal of Computer and Information Sciences 12, 337–346 (1983). https://doi.org/10.1007/BF01008045
Received:
Revised:
Issue Date:
DOI: https://doi.org/10.1007/BF01008045