2019
DOI: 10.7494/csci.2019.20.3.3307
|View full text |Cite
|
Sign up to set email alerts
|

The application of modified Chebyshev polynomials in asymmetric cryptography

Abstract: Based on Chebyshev polynomials, one can create an asymmetric cryptosystem that allows for secure communication. Such a cryptosystem is based on the fact that these polynomials form a semi-group due to the composition operation. This article presents two new cryptosystems based on modifications of Chebyshev's polynomials. The presented analysis shows that their security is the same as in the case of algorithms associated with the problem of discrete logarithms. The article also shows methods that allow for the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…Below is an example of calculating the number of irreducible polynomials for n = 32 in GF p , where p = 3, 5, 7,11,13,17,19,23,29,31,37,43:…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Below is an example of calculating the number of irreducible polynomials for n = 32 in GF p , where p = 3, 5, 7,11,13,17,19,23,29,31,37,43:…”
Section: Resultsmentioning
confidence: 99%
“…The use of the residue number system (RNS) [19][20][21] in the implementation of cryptographic algorithms for information security based on polynomial arithmetic in the Z x ring [22,23], by analogy with the integer RNS [24,25], leads to parallelization of the computation process [26,27] and reduction of the amount of data that must be processed during cryptographic operations [28][29][30]. In turn, it reduces the implementation time and improves the efficiency of the encryption method.…”
Section: Introductionmentioning
confidence: 99%
“…From a scientific and practical point of view, chaotic oscillations are the most interesting. They are found both in engineering (e.g., in chemical reactors [ 1 , 2 , 3 ]) and in such fields as cryptography (e.g., [ 4 ]). Research in the field of chaos covers issues such as hyperchaos and multistability [ 5 , 6 ], Lyapunov exponents [ 7 ], or systems with lags [ 8 ].…”
Section: Introductionmentioning
confidence: 99%
“…The ability to calculate the private key from the public is almost very difficult if not impossible. Usually, the public key encryption based on the chaotic map used the Chebyshev map due to the semigroup property of this map [19]. Prasadh et al [20] designed a public-key cryptosystem based on the Chebyshev map to encrypt the image.…”
Section: Introductionmentioning
confidence: 99%