SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Pure and Applied Mathematics
Volume 85 No. 5 2013, 933-937
ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)
url: http://www.ijpam.eu
doi: http://dx.doi.org/10.12732/ijpam.v85i5.11
PAijpam.eu
SECURE SCHEMES FOR SECRET SHARING AND
KEY DISTRIBUTION USING PELL’S EQUATION
P. Muralikrishna1 §, S. Srinivasan2, N. Chandramowliswaran3
1,2School of Advanced Sciences
VIT University
Vellore, 632014, Tamilnadu. INDIA
3Visiting Faculty
Indian Institute of Management Indore
Indore, 453 331, INDIA
Abstract: A key distribution scheme for dynamic conferences is a method
by which initially an trusted server distributes private individual pieces of in-
formation to a set of users. Later each member of any group of users of given
size can compute a common secure group key. In this setting any group of t
users can compute a common key by each user computing using only his pri-
vate initial piece of information and the identities of the other t − 1 users in
the group. Keys are secure against coalition of to k users, that is, even if k
users pool together their pieces they cannot compute anything about a key of
any t-size conference comprised of other users. In this paper, we introduce an
algorithm for such perfectly secure scheme by using Pell’s equation.
1. Introduction
Key distribution is a central problem in cryptographic systems, and major
component of the security subsystem of distributed systems, communication
systems, and data networks. Secret sharing was invented independently by
Adi Shamir [3] and George Blakley [1] in 1979. Secret sharing schemes are
ideal for storing information that is highly sensitive and highly important. If
Received: April 15, 2013 c 2013 Academic Publications, Ltd.
url: www.acadpubl.eu
§Correspondence author
934 P. Muralikrishna, S. Srinivasan, N. Chandramowliswaran
users of a group wish to communicate using symmetric encryption, they must
share a common key. A secure secret sharing scheme distributes shares so that
anyone with fewer than t shares has no extra information about the secret
than someone with 0 shares. Recently, in [4], we discussed a secure secret key
sharing algorithm using non-homogeneous equation. In this paper, we give an
algorithm for such perfectly secure scheme by using Pell’s equation.
2. Main Results
In this section we give key distribution problem and algorithm. The proposed
system involves a design of a pre-distribution algorithm using a deterministic
approach. Deterministic approach is the process of determining the keys before
placing them within the network. A key pre-distribution algorithm using num-
ber theory with high connectivity, high resilience and memory requirements is
being designed by implementing a deterministic approach. In [5], the Pell’s
equation of the number theory is used in the generation of the key chain.
Construction and Algorithm for Key Sharing
• Select a secret odd prime integer R.
• Consider the Pell’s Equation:
y2
− Rx2
= 1. (1)
• Let (x0, y0) be the least positive integral solution of (1).
Here x0, y0 are kept as secret.
• Select two large RSA odd primes p and q.
• Define N = pq then φ(N) = (p − 1)(q − 1)
where φ(N) is Euler phi function.
• Select a RSA secret exponent e such that [1 < e < φ(N)] such that
gcd(e, φ(N)) = 1.
• For this e, there is a unique d such that ed ≡ 1(mod φ(N)).
• consider
a = (y0 + φ(N))2
− R(x0 + e)2
. (2)
SECURE SCHEMES FOR SECRET SHARING AND... 935
• e3 is not congruent to 1(mod φ(N)) and d3 is not congruent to 1(mod φ(N)).
• From (2) ad3 + Rd + 2x0d2R ≡ d3 (mod φ(N)).
• Let S = ad3 + 2x0d2R + Rd then S ≡ d3 (mod φ(N)).
• Here we define S is the exponent secret.
• Represent the message m in the interval [0, n − 1] with gcd(m, n) = 1.
d3
d1
d2
dℓ
md1
md2
mdℓ
md3
(mod n)Signing Key
Shares of Key Partial Key
Final Signature
d3 = d1 + d2 + · · · + dℓ
• Key distribution: Consider the ℓ exponent secret partition (share holders)
S = t1 + t2 + · · · + tℓ.
Define Yi ≡ mti (mod N) for 1 ≤ i ≤ ℓ:
ℓ
1 Yi ≡ mS(mod N)
≡ mt1+t2+···+tℓ (mod N)
≡ mt1 mt2 . . . mtℓ (mod N).
• For ℓ secret share holders we can distribute ℓ key’s such as Y1, Y2, . . . , Yℓ.
• Secure Sharing Scheme:
E ≡ ms(mod n)
≡ mkφ(n)+d3
(mod n)
936 P. Muralikrishna, S. Srinivasan, N. Chandramowliswaran
≡ mkφ(n)md3
(mod n)
≡ [mφ(n)]kmd3
(mod n)
≡ md3
(mod n).
• High Level Authentication Key manager is e3:
( ℓ
1 Yi)e3
≡ (md3
)e3
(mod N),
( ℓ
1 Yi)e3
≡ m(mod N).
3. Conclusion
In resent years the security of operations taking place over a computer network
become very important. It is necessary to protect such actions against bad users
who may try to misuse the system. Many protocols and schemes were designed
to solve problem of this type. To overcome the various security vulnerabilities
in the networks the design of a pre distribution algorithm using a deterministic
approach is initiated. The deterministic approach is the process of determining
the keys or key chain based on some criteria. In this paper, we have proposed
a novel deterministic key pre distribution algorithm using the pell’s equation.
In our future work, after analyzing the performance of key distribution algo-
rithm, we plan to extend this novel algorithm for hierarchal wireless network
by adapting probabilistic method.
References
[1] Adi Shamir, How to share a secret, Communications of the ACM, 22, No.
11 (1979, 612-613.
[2] A. Beimel, Secret-sharing schemes: A survey, In: Proceedings of the Third
International Conference on Coding and Cryptology, Berlin, Heidelberg,
Springer-Verlag, IWCC’11 (2011), 11-46.
[3] G.R. Blakley, Safeguarding cryptographic keys, Proceedings of the National
Computer Conference, 48 (1979), 313-317.
[4] N. Chandramowliswaran, S. Srinivasan, P. Muralikrishna, Secure schemes
for secret sharing and key distribution using non-homogeneous equation,
Submitted.
SECURE SCHEMES FOR SECRET SHARING AND... 937
[5] Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery, An Intro-
duction to the Theory of Numbers, John Wiley.
[6] Tom M. Apostol, Introduction to Analytic Number Theory, Springer.
938

More Related Content

What's hot

Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...eSAT Publishing House
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Security enhancement in confidential data transmission
Security enhancement in confidential data transmissionSecurity enhancement in confidential data transmission
Security enhancement in confidential data transmissionRaj Rajeshwar Singh Rathore
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms Er Piyush Gupta IN ⊞⌘
 
Hierarchical Clustering
Hierarchical ClusteringHierarchical Clustering
Hierarchical ClusteringMegha Sharma
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsaMohsin Ali
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
A Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in CryptographyA Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in Cryptographyijtsrd
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...csandit
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 

What's hot (20)

Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...Load balancing in public cloud combining the concepts of data mining and netw...
Load balancing in public cloud combining the concepts of data mining and netw...
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
C0281010016
C0281010016C0281010016
C0281010016
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Security enhancement in confidential data transmission
Security enhancement in confidential data transmissionSecurity enhancement in confidential data transmission
Security enhancement in confidential data transmission
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 
Hierarchical Clustering
Hierarchical ClusteringHierarchical Clustering
Hierarchical Clustering
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
RSA Algorithem and information about rsa
RSA Algorithem and information about rsaRSA Algorithem and information about rsa
RSA Algorithem and information about rsa
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
82 86
82 8682 86
82 86
 
50120140507006
5012014050700650120140507006
50120140507006
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
A Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in CryptographyA Study of RSA Algorithm in Cryptography
A Study of RSA Algorithm in Cryptography
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
A SECURE DIGITAL SIGNATURE SCHEME WITH FAULT TOLERANCE BASED ON THE IMPROVED ...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 

Similar to 11

Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERijcsit
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverAIRCC Publishing Corporation
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERAIRCC Publishing Corporation
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data MiningIJMER
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...IOSR Journals
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingeSAT Journals
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptRizwanBasha12
 

Similar to 11 (20)

Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Rsa
RsaRsa
Rsa
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
D018141922
D018141922D018141922
D018141922
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Az24339344
Az24339344Az24339344
Az24339344
 
Securing Personal Information in Data Mining
Securing Personal Information in Data MiningSecuring Personal Information in Data Mining
Securing Personal Information in Data Mining
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
Double Key Encryption Method (DKEM) Algorithms Using ANN for Data Storing and...
 
15
1515
15
 
15
1515
15
 
29-SrinivasanMuralikrishnaChandramowliswaran
29-SrinivasanMuralikrishnaChandramowliswaran29-SrinivasanMuralikrishnaChandramowliswaran
29-SrinivasanMuralikrishnaChandramowliswaran
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
PUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.pptPUBLIC KEY & RSA.ppt
PUBLIC KEY & RSA.ppt
 

More from Chandramowliswaran NARAYANASWAMY

More from Chandramowliswaran NARAYANASWAMY (20)

M.tech.quiz (1)
M.tech.quiz (1)M.tech.quiz (1)
M.tech.quiz (1)
 
number theory chandramowliswaran theorem
number theory chandramowliswaran theoremnumber theory chandramowliswaran theorem
number theory chandramowliswaran theorem
 
tree-gen-algo
tree-gen-algotree-gen-algo
tree-gen-algo
 
invited-seminar-libre(1)
invited-seminar-libre(1)invited-seminar-libre(1)
invited-seminar-libre(1)
 
testimonial_iit_3_(3)
testimonial_iit_3_(3)testimonial_iit_3_(3)
testimonial_iit_3_(3)
 
Passman
PassmanPassman
Passman
 
graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)
 
recom
recomrecom
recom
 
higman
higmanhigman
higman
 
balakrishnan2004
balakrishnan2004balakrishnan2004
balakrishnan2004
 
April2012ART_01(1)
April2012ART_01(1)April2012ART_01(1)
April2012ART_01(1)
 
DDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
DDDDDDDDDDDDDDDDDD
 
CCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCC
 
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB
 
PETERSON BERGE
PETERSON BERGEPETERSON BERGE
PETERSON BERGE
 
FDP SumCourse Schedule July 2009 (1)
FDP SumCourse Schedule July  2009 (1)FDP SumCourse Schedule July  2009 (1)
FDP SumCourse Schedule July 2009 (1)
 
kyoto-seminar
kyoto-seminarkyoto-seminar
kyoto-seminar
 
japan-invite
japan-invitejapan-invite
japan-invite
 
R.S.A Encryption
R.S.A EncryptionR.S.A Encryption
R.S.A Encryption
 
scsvmv-testimonial
scsvmv-testimonialscsvmv-testimonial
scsvmv-testimonial
 

11

  • 1. International Journal of Pure and Applied Mathematics Volume 85 No. 5 2013, 933-937 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v85i5.11 PAijpam.eu SECURE SCHEMES FOR SECRET SHARING AND KEY DISTRIBUTION USING PELL’S EQUATION P. Muralikrishna1 §, S. Srinivasan2, N. Chandramowliswaran3 1,2School of Advanced Sciences VIT University Vellore, 632014, Tamilnadu. INDIA 3Visiting Faculty Indian Institute of Management Indore Indore, 453 331, INDIA Abstract: A key distribution scheme for dynamic conferences is a method by which initially an trusted server distributes private individual pieces of in- formation to a set of users. Later each member of any group of users of given size can compute a common secure group key. In this setting any group of t users can compute a common key by each user computing using only his pri- vate initial piece of information and the identities of the other t − 1 users in the group. Keys are secure against coalition of to k users, that is, even if k users pool together their pieces they cannot compute anything about a key of any t-size conference comprised of other users. In this paper, we introduce an algorithm for such perfectly secure scheme by using Pell’s equation. 1. Introduction Key distribution is a central problem in cryptographic systems, and major component of the security subsystem of distributed systems, communication systems, and data networks. Secret sharing was invented independently by Adi Shamir [3] and George Blakley [1] in 1979. Secret sharing schemes are ideal for storing information that is highly sensitive and highly important. If Received: April 15, 2013 c 2013 Academic Publications, Ltd. url: www.acadpubl.eu §Correspondence author
  • 2. 934 P. Muralikrishna, S. Srinivasan, N. Chandramowliswaran users of a group wish to communicate using symmetric encryption, they must share a common key. A secure secret sharing scheme distributes shares so that anyone with fewer than t shares has no extra information about the secret than someone with 0 shares. Recently, in [4], we discussed a secure secret key sharing algorithm using non-homogeneous equation. In this paper, we give an algorithm for such perfectly secure scheme by using Pell’s equation. 2. Main Results In this section we give key distribution problem and algorithm. The proposed system involves a design of a pre-distribution algorithm using a deterministic approach. Deterministic approach is the process of determining the keys before placing them within the network. A key pre-distribution algorithm using num- ber theory with high connectivity, high resilience and memory requirements is being designed by implementing a deterministic approach. In [5], the Pell’s equation of the number theory is used in the generation of the key chain. Construction and Algorithm for Key Sharing • Select a secret odd prime integer R. • Consider the Pell’s Equation: y2 − Rx2 = 1. (1) • Let (x0, y0) be the least positive integral solution of (1). Here x0, y0 are kept as secret. • Select two large RSA odd primes p and q. • Define N = pq then φ(N) = (p − 1)(q − 1) where φ(N) is Euler phi function. • Select a RSA secret exponent e such that [1 < e < φ(N)] such that gcd(e, φ(N)) = 1. • For this e, there is a unique d such that ed ≡ 1(mod φ(N)). • consider a = (y0 + φ(N))2 − R(x0 + e)2 . (2)
  • 3. SECURE SCHEMES FOR SECRET SHARING AND... 935 • e3 is not congruent to 1(mod φ(N)) and d3 is not congruent to 1(mod φ(N)). • From (2) ad3 + Rd + 2x0d2R ≡ d3 (mod φ(N)). • Let S = ad3 + 2x0d2R + Rd then S ≡ d3 (mod φ(N)). • Here we define S is the exponent secret. • Represent the message m in the interval [0, n − 1] with gcd(m, n) = 1. d3 d1 d2 dℓ md1 md2 mdℓ md3 (mod n)Signing Key Shares of Key Partial Key Final Signature d3 = d1 + d2 + · · · + dℓ • Key distribution: Consider the ℓ exponent secret partition (share holders) S = t1 + t2 + · · · + tℓ. Define Yi ≡ mti (mod N) for 1 ≤ i ≤ ℓ: ℓ 1 Yi ≡ mS(mod N) ≡ mt1+t2+···+tℓ (mod N) ≡ mt1 mt2 . . . mtℓ (mod N). • For ℓ secret share holders we can distribute ℓ key’s such as Y1, Y2, . . . , Yℓ. • Secure Sharing Scheme: E ≡ ms(mod n) ≡ mkφ(n)+d3 (mod n)
  • 4. 936 P. Muralikrishna, S. Srinivasan, N. Chandramowliswaran ≡ mkφ(n)md3 (mod n) ≡ [mφ(n)]kmd3 (mod n) ≡ md3 (mod n). • High Level Authentication Key manager is e3: ( ℓ 1 Yi)e3 ≡ (md3 )e3 (mod N), ( ℓ 1 Yi)e3 ≡ m(mod N). 3. Conclusion In resent years the security of operations taking place over a computer network become very important. It is necessary to protect such actions against bad users who may try to misuse the system. Many protocols and schemes were designed to solve problem of this type. To overcome the various security vulnerabilities in the networks the design of a pre distribution algorithm using a deterministic approach is initiated. The deterministic approach is the process of determining the keys or key chain based on some criteria. In this paper, we have proposed a novel deterministic key pre distribution algorithm using the pell’s equation. In our future work, after analyzing the performance of key distribution algo- rithm, we plan to extend this novel algorithm for hierarchal wireless network by adapting probabilistic method. References [1] Adi Shamir, How to share a secret, Communications of the ACM, 22, No. 11 (1979, 612-613. [2] A. Beimel, Secret-sharing schemes: A survey, In: Proceedings of the Third International Conference on Coding and Cryptology, Berlin, Heidelberg, Springer-Verlag, IWCC’11 (2011), 11-46. [3] G.R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference, 48 (1979), 313-317. [4] N. Chandramowliswaran, S. Srinivasan, P. Muralikrishna, Secure schemes for secret sharing and key distribution using non-homogeneous equation, Submitted.
  • 5. SECURE SCHEMES FOR SECRET SHARING AND... 937 [5] Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery, An Intro- duction to the Theory of Numbers, John Wiley. [6] Tom M. Apostol, Introduction to Analytic Number Theory, Springer.
  • 6. 938