2011
DOI: 10.4236/ijcns.2011.47058
|View full text |Cite
|
Sign up to set email alerts
|

Double-Moduli Gaussian Encryption/Decryption with Primary Residues and Secret Controls

Abstract: In this paper an encryption-decryption algorithm based on two moduli is described: one in the real field of integers and another in the field of complex integers. Also the proper selection of cryptographic system parameters is described. Several numeric illustrations explain step-by-step how to precondition a plaintext, how to select secret control parameters, how to ensure feasibility of all private keys and how to avoid ambiguity in the process of information recovery. The proposed cryptographic system is fa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2012
2012

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Yet, every real prime n that satisfies is the complex composite, [9]. A public key cryptographic algorithm based on complex moduli is described in [10]. mod 4 1 …”
Section: Generalizationsmentioning
confidence: 99%
“…Yet, every real prime n that satisfies is the complex composite, [9]. A public key cryptographic algorithm based on complex moduli is described in [10]. mod 4 1 …”
Section: Generalizationsmentioning
confidence: 99%
“…The cryptosystem introduced by Verkhovsky in [1], for which we construct an attack, is described in this section. We assume an a priori agreed large integer .…”
Section: Double Moduli Cryptosystemmentioning
confidence: 99%
“…x . Using the last equality and computing , we obtain that 1 If we analyze the complexity of Algorithm 4.1, we easily see that each step is completed in polynomial time. By running Algorithm 4.1, an adversary is able to decrypt any message with a high probability.…”
Section: Lattice Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we provided a deterministic algorithm with polynomial time complexity that computes a complex prime (C, F) for every real prime p. In [9] is demonstrated how to implement the complex primes in cryptographic systems based on double moduli reduction, where one modulus is a real prime and another modulus is a complex prime.…”
Section: Counting Points: Detailed Descrmentioning
confidence: 99%