2005
DOI: 10.1109/tcsi.2005.851701
|View full text |Cite
|
Sign up to set email alerts
|

Security of public-key cryptosystems based on Chebyshev polynomials

Abstract: Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
193
0
5

Year Published

2011
2011
2022
2022

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 263 publications
(200 citation statements)
references
References 31 publications
2
193
0
5
Order By: Relevance
“…Chebyshev polynomials are employed in various cryptographic schemes including key agreement protocols [26,34], password-based authentication schemes [16,20], public key encryption schemes [37,8], and RFID authentication protocols [11,6,3]. The implementation of Chebyshev polynomials uses small resources so that smart cards and RFID tags can utilize them.…”
Section: Theorem 5 Our Protocol Satisfies Forward Privacy Given That mentioning
confidence: 99%
“…Chebyshev polynomials are employed in various cryptographic schemes including key agreement protocols [26,34], password-based authentication schemes [16,20], public key encryption schemes [37,8], and RFID authentication protocols [11,6,3]. The implementation of Chebyshev polynomials uses small resources so that smart cards and RFID tags can utilize them.…”
Section: Theorem 5 Our Protocol Satisfies Forward Privacy Given That mentioning
confidence: 99%
“…Public-key systems are considered to be slower than private (symmetric) key systems, so that they are used to encrypt small data items and preferable to be used as a key exchange in symmetric systems to protect the real data (Xiang et al, 2005). All the three encryption algorithms RSA, Rabin and ElGamal are based on their mechanism on the following system:…”
Section: Public Key Systemsmentioning
confidence: 99%
“…In this section we briefly describe Chebyshev polynomials, since they represent the cornerstone on which the public key cryptosystem, described in [11,15], key agreement protocols, described in [23] and the authentication scheme, described in [14], are built.…”
Section: Chebyshev Polynomialsmentioning
confidence: 99%
“…But it was soon found the private key could be quickly recovered from the public key, using trigonometric function substitution [14,16]. In other words, the oneway condition is not satisfied in such cryptosystem.…”
mentioning
confidence: 99%