SlideShare a Scribd company logo
International Journal of Pure and Applied Mathematics
Volume 87 No. 2 2013, 349-354
ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)
url: http://www.ijpam.eu
doi: http://dx.doi.org/10.12732/ijpam.v87i2.15
PAijpam.eu
AUTHENTICATED MULTIPLE KEY
DISTRIBUTION USING SIMPLE CONTINUED FRACTION
S. Srinivasan1, P. Muralikrishna2 §, N. Chandramowliswaran3
1,2School of Advanced Sciences
VIT University
Vellore, 632014, Tamilnadu. INDIA
3Visiting Faculty
Indian Institute of Management Indore
Indore, 453 331, INDIA
Abstract: In resent years the security of operations taking place over a com-
puter network become very important. It is necessary to protect such actions
against bad users who may try to misuse the system (e.g. steal credit card
numbers, read personal mail, or impersonate other users.) Many protocols and
schemes were designed to solve problem of this type. Threshold cryptography
is a novel cryptographic technique sharing secret among members. It divides
a secret key into multiple shares by a cryptographic operation. In this paper,
we proposed a key distribution algorithm based on Simple Continued Fraction.
The goal of our algorithm is to divide a secret S into ℓ pieces s1 + s2 + · · · + sℓ
such that, ℓ pieces are necessary to reconstruct S, but any m < ℓ pieces give
no information about S.
AMS Subject Classification: 94A60, 94A62
Key Words: simple continued fraction, shares, RSA prime
1. Introduction
Secret sharing (also called secret splitting) refers to method for distributing a
Received: June 15, 2013 c 2013 Academic Publications, Ltd.
url: www.acadpubl.eu
§Correspondence author
350 S. Srinivasan, P. Muralikrishna, N. Chandramowliswaran
secret amongst a group of participants, each of whom is allocated a share of
the secret. The secret can be reconstructed only when a sufficient number, of
possibly different types, of shares are combined together; individual shares are
of no use on their own.
Secret sharing was invented independently by Adi Shamir [3] and George
Blakley [1] in 1979. Secret sharing schemes are ideal for storing information
that is highly sensitive and highly important. Examples include: encryption
keys, missile launch codes and numbered bank accounts. Each of these pieces of
information must be kept highly confidential, as their exposure could be disas-
trous, however, it is also critical that they not be lost. Traditional methods for
encryption are ill-suited for simultaneously achieving high levels of confidential-
ity and reliability. This is because when storing the encryption key, one must
choose between keeping a single copy of the key in one location for maximum
secrecy, or keeping multiple copies of the key in different locations for greater
reliability. Increasing reliability of the key by storing multiple copies lowers
confidentiality by creating additional attack vectors; there are more opportu-
nities for a copy to fall into the wrong hands. Secret sharing schemes address
this problem, and allow arbitrarily high levels of confidentiality and reliability
to be achieved.
A secure secret sharing scheme distributes shares so that anyone with fewer
than t shares has no extra information about the secret than someone with 0
shares.
Consider for example the secret sharing scheme in which the secret phrase
security is divided into the shares se−−−−−−, −−cu−−−−, −−−−ri−−,
and −−−−−−ty. A person with 0 shares knows only that the password consists
of eight letters. He would have to guess the password from 268 = 208 billion
possible combinations. A person with one share, however, would have to guess
only the six letters, from 266 = 308 million combinations, and so on as more
persons collude. Consequently this system is not a secure secret sharing scheme,
because a player with fewer than t secret-shares is able to reduce the problem
of obtaining the inner secret without first needing to obtain all of the necessary
shares.
2. Proposed Algorithms
Construction of the Non-Homogeneous Equation
Definition An expression of the form C0 + 1
C1+
1
C2+
1
C3+ . . . 1
+Cn
. . . where Cj :
AUTHENTICATED MULTIPLE KEY... 351
j ≥ 1 are positive integers and C0 is a non-negative integer is called a Simple
Continued Fraction (SCF).
• Define P1
Q1
= C0
1
P2
Q2
= C0 + 1
C1
= C0C1+1
C1
P3
Q3
= C0 + 1
C1+ 1
C2
= C0[C1C2+1]+C2
C1C2+1
• In general, we have
Pn+1
Qn+1
= C0 + 1
C1+
1
C2+
1
C3+ . . . 1
+Cn
(1)
= C0 + 1
C1+ 1
C2+ 1
C3+···+ 1
Cn−1+ 1
Cn
(2)
then, Pn+1
Qn+1
is called (n + 1)th convergent of SCF
• Let us denote C0 + 1
C1+
1
C2+
1
C3+ . . . 1
+Cn
by [C0; C1, C2, C3, . . . , Cn−1, Cn]
i.e., Pn+1
Qn+1
= [C0; C1, C2, C3, . . . , Cn−1, Cn] (3)
• Alternatively, we can represent SCF as the product of special 2 × 2 ma-
trices over non-negative integers
C0 1
1 0
C1 1
1 0 . . . Cn 1
1 0 =
Pn+1 Pn
Qn+1 Qn
(4)
• Taking determinant on both sides of (4), we get
(−1)n+1 = Pn+1Qn − Qn+1Pn for all n ≥ 1 (5)
• Taking transpose of (4), we get
Cn 1
1 0
Cn−1 1
1 0
. . . C0 1
1 0 = Pn+1 Qn+1
Pn Qn
• Let R1, R2 be two given very large odd primes with R1 < R2
• Represent R1
R2
as a SCF
R1
R2
= C0 + 1
C1+
1
C2+
1
C3+ . . . 1
+Cn
= [C0; C1, C2, C3, . . . , Cn−1, Cn] (6)
• Consider the symmetric continue fraction of length 2n + 2
P2n+2
Q2n+2
= [Cn; Cn−1, Cn−2, . . . , C1, C0, C0; C1, C2, C3, . . . , Cn−1, Cn] (7)
where Pi
Qi
be the ith convergent of (7)
• Pn+1
Qn+1
= [Cn; Cn−1, Cn−2, . . . , C1, C0]
Pn
Qn
= [Cn; Cn−1, Cn−2, . . . , C1]
Pn+1
Pn
= [C0; C1, C2, C3, . . . , Cn−1, Cn]
Qn+1
Qn
= [C0; C1, C2, C3, . . . , Cn−1]
352 S. Srinivasan, P. Muralikrishna, N. Chandramowliswaran
• Therefore
Cn 1
1 0
Cn−1 1
1 0
. . . C1 1
1 0
C0 1
1 0
C0 1
1 0
C1 1
1 0 . . . Cn 1
1 0
=
P2n+2 P2n+1
Q2n+2 Q2n+1
=A (8)
• Clearely, det(A) = (−1)2n+2 = 1
• Consider
Cn 1
1 0
Cn−1 1
1 0
. . . C1 1
1 0
C0 1
1 0
C0 1
1 0
C1 1
1 0 . . . Cn 1
1 0
= [Cn; Cn−1, . . . , C1, C0, C0; C1, C2, . . . , Cn−1Cn]
=
Pn+1 Pn
Qn1 Qn
Pn+1 Qn+1
Pn Qn
=
P 2
n+1+P 2
n Pn+1Qn+1+PnQn
Pn+1Qn+1+PnQn Q2
n+1+Q2
n
=
P2n+2 P2n+1
Q2n+2 Q2n+1
• P2n+2Q2n+1 − P2n+1Q2n+2 = 1
(P2
n+1 + P2
n )Q2n+1 = P2
2n+1 + 1
(R2
1 + R2
2)Y = X2 + 1
where Pn+1 = R1, Pn = R2, P2n+1 = X and Q2n+1 = Y
Here, we proposed an algorithm and its actual implementation. Our pri-
mary contribution is that, in our algorithm we discussed the key sharing by
using two prime numbers and a non-homogeneous equation with two variables.
The share holders can verify the validity of their shares only after reconstruc-
tion of the secret and any share holders fewer than ℓ, can not reconstruct the
secret.
Algorithm for Encryption
• Choose two secret very large odd primes R1, R2 with R1 > R2
• Construct x2 + 1 = (R2
1 + R2
2)y
• Select two large RSA secret odd primes p and q
• Define N = pq then φ(N) = (p − 1)(q − 1) where φ(N) is Euler phi
function
• Select a secret exponent e such that (e, φ(N)) = 1 where 1 < e < φ(N)
• For this e, there is a unique d such that ed ≡ 1(mod φ(N))
AUTHENTICATED MULTIPLE KEY... 353
• consider a = (R2
1 + R2
2)(y + d) − (x + φ(N))2
a = (R2
1 + R2
2)y − x2 + (R2
1 + R2
2)d − [φ(N)]2 − 2xφ(N)
= 1 + (R2
1 + R2
2)d − [φ(N)]2 − 2xφ(N)
a ≡ (1 + (R2
1 + R2
2)d) (mod φ(N))
ae ≡ (e + (R2
1 + R2
2)) (mod φ(N))
S ≡ e(mod φ(N)) where S = ae − (R2
1 + R2
2)
• Here we define S is the exponent secret
• Represent the secret message m in the interval [0, N − 1]
with gcd(m, N) = 1
Algorithm for Key Sharing
• Consider the ℓ exponent secret partition (share holders)
S = s1 + s2 + · · · + sℓ
Define Yi ≡ msi (mod N) for 1 ≤ i ≤ ℓ
ℓ
1 Yi ≡ mS(mod N)
≡ ms1+s2+···+sℓ (mod N)
≡ ms1 ms2 . . . msℓ (mod N)
• For ℓ secret share holders we can distribute ℓ key’s such as Y1, Y2, . . . , Yℓ
• Sharing scheme follows from the given equations:
ℓ
1 Yi ≡ mS(mod N)
354 S. Srinivasan, P. Muralikrishna, N. Chandramowliswaran
≡ mkφ(N)+e(mod N)
≡ mkφ(N)me(mod N)
≡ [mφ(N)]kme(mod N)
ℓ
1 Yi ≡ me(mod N)
• High Level Authentication Key manager is d
( ℓ
1 Yi)d ≡ (me)d(mod N)
( ℓ
1 Yi)d ≡ m(mod N)
3. Conclusion
This paper dealt with a secret key sharing mechanism on ℓ share holders. Ac-
cording to the algorithm, the secret can be well shared with feasible sense, it
may have some performance impact when the number of share holders is ac-
cordingly increased. Our approach to secret sharing is opened a number of
avenues for future work. These include research into finding schemes that will
remove the restrictions on the size of ℓ. These schemes make it possible to store
secret information in a network.
References
[1] Adi Shamir, How to share a secret, Communications of the ACM, 22, No.
11 (1979), 612-613.
[2] A. Beimel, Secret-sharing schemes: a survey, In: Proceedings of the Third
International Conference on Coding and Cryptology, Berlin, Heidelberg,
2011, Springer-Verlag, IWCC’11, 11-46.
[3] G.R. Blakley, Safeguarding cryptographic keys, Proceedings of the National
Computer Conference, 48 (1979), 313-317.
[4] P. Muralikrishna, S. Srinivasan, N. Chandramowliswaran, Secure schemes
for secret sharing and key distribution using Pell’s equation, Interna-
tional Journal of Pure and Applied Mathematics, 85, No. 5, 33-937, doi:
10.12732/ijpam.v85i5.11.
[5] Ivan Niven, Herbert S. Zuckerman, Hugh L. Montgomery, An Introduction
to the Theory of Numbers, John Wiley.
[6] Tom M. Apostol, Introduction to Analytic Number Theory, Springer.

More Related Content

What's hot

Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Shinpei Hayashi
 
The Big M Method - Operation Research
The Big M Method - Operation ResearchThe Big M Method - Operation Research
The Big M Method - Operation Research
2013901097
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
Ahmar Hashmi
 
dda algorithm
dda  algorithmdda  algorithm
dda algorithm
774474
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodIAEME Publication
 
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLYHOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
IJNSA Journal
 
Designing A Minimum Distance to Class Mean Classifier
Designing A Minimum Distance to Class Mean ClassifierDesigning A Minimum Distance to Class Mean Classifier
Designing A Minimum Distance to Class Mean Classifier
Md. Toufique Hasan
 
Rmanalogias
RmanalogiasRmanalogias
Rmanalogias
AndersonMaldonado10
 
Pattern Recognition - Designing a minimum distance class mean classifier
Pattern Recognition - Designing a minimum distance class mean classifierPattern Recognition - Designing a minimum distance class mean classifier
Pattern Recognition - Designing a minimum distance class mean classifier
Nayem Nayem
 
Pattern Recognition: Class mean classifier
Pattern Recognition: Class mean classifierPattern Recognition: Class mean classifier
Pattern Recognition: Class mean classifier
Md Mamunur Rashid
 
mike dilone
mike dilonemike dilone
mike dilone
guestbcd69b
 
SMU BCA Sem 1 Winter 2014 Assignments
SMU BCA Sem 1 Winter 2014 AssignmentsSMU BCA Sem 1 Winter 2014 Assignments
SMU BCA Sem 1 Winter 2014 Assignments
solved_assignments
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
rahulmonikasharma
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnetssnv09
 

What's hot (17)

Class Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint SatisfactionClass Responsibility Assignment as Fuzzy Constraint Satisfaction
Class Responsibility Assignment as Fuzzy Constraint Satisfaction
 
The Big M Method - Operation Research
The Big M Method - Operation ResearchThe Big M Method - Operation Research
The Big M Method - Operation Research
 
31 Network Security
31 Network Security31 Network Security
31 Network Security
 
dda algorithm
dda  algorithmdda  algorithm
dda algorithm
 
Fast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s methodFast dct algorithm using winograd’s method
Fast dct algorithm using winograd’s method
 
How to calculate slope
How to calculate slopeHow to calculate slope
How to calculate slope
 
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLYHOW TO FIND A FIXED POINT IN SHUFFLE  EFFICIENTLY
HOW TO FIND A FIXED POINT IN SHUFFLE EFFICIENTLY
 
Designing A Minimum Distance to Class Mean Classifier
Designing A Minimum Distance to Class Mean ClassifierDesigning A Minimum Distance to Class Mean Classifier
Designing A Minimum Distance to Class Mean Classifier
 
Rmanalogias
RmanalogiasRmanalogias
Rmanalogias
 
Pattern Recognition - Designing a minimum distance class mean classifier
Pattern Recognition - Designing a minimum distance class mean classifierPattern Recognition - Designing a minimum distance class mean classifier
Pattern Recognition - Designing a minimum distance class mean classifier
 
Pattern Recognition: Class mean classifier
Pattern Recognition: Class mean classifierPattern Recognition: Class mean classifier
Pattern Recognition: Class mean classifier
 
Aleksander gegov
Aleksander gegovAleksander gegov
Aleksander gegov
 
mike dilone
mike dilonemike dilone
mike dilone
 
SMU BCA Sem 1 Winter 2014 Assignments
SMU BCA Sem 1 Winter 2014 AssignmentsSMU BCA Sem 1 Winter 2014 Assignments
SMU BCA Sem 1 Winter 2014 Assignments
 
Implementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image SecurityImplementation of ECC and ECDSA for Image Security
Implementation of ECC and ECDSA for Image Security
 
kmean clustering
kmean clusteringkmean clustering
kmean clustering
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 

Similar to 15

How to Share a Secret
How to Share a SecretHow to Share a Secret
How to Share a Secret
Kelum Senanayake
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
FahmiOlayah
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
ijcsit
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
AIRCC Publishing Corporation
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
AIRCC Publishing Corporation
 
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXESDYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
IJCSEA Journal
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
CSCJournals
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
DHANABALSUBRAMANIAN
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
Samdish Arora
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
ChandraB15
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
Sou Jana
 
F010243136
F010243136F010243136
F010243136
IOSR Journals
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
Factorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret NumbersFactorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret Numbers
Universitas Pembangunan Panca Budi
 
Rsa
RsaRsa

Similar to 15 (20)

11
1111
11
 
11
1111
11
 
NCM RB PAPER
NCM RB PAPERNCM RB PAPER
NCM RB PAPER
 
How to Share a Secret
How to Share a SecretHow to Share a Secret
How to Share a Secret
 
Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...Public-Key Cryptography.pdfWrite the result of the following operation with t...
Public-Key Cryptography.pdfWrite the result of the following operation with t...
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT SolverBreaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
 
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXESDYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
DYNAMIC SESSION KEY EXCHANGE METHOD USING TWO S-BOXES
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
RSA Algm.pptx
RSA Algm.pptxRSA Algm.pptx
RSA Algm.pptx
 
F010243136
F010243136F010243136
F010243136
 
3 pkc+rsa
3 pkc+rsa3 pkc+rsa
3 pkc+rsa
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Factorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret NumbersFactorization Hack of RSA Secret Numbers
Factorization Hack of RSA Secret Numbers
 
Rsa
RsaRsa
Rsa
 
Rsa
RsaRsa
Rsa
 

More from NARAYANASWAMY CHANDRAMOWLISWARAN

More from NARAYANASWAMY CHANDRAMOWLISWARAN (20)

ncm SCSVMV
ncm SCSVMVncm SCSVMV
ncm SCSVMV
 
m.tech final
m.tech finalm.tech final
m.tech final
 
M.tech.quiz (1)
M.tech.quiz (1)M.tech.quiz (1)
M.tech.quiz (1)
 
FDP SumCourse Schedule July 2009 (1)
FDP SumCourse Schedule July  2009 (1)FDP SumCourse Schedule July  2009 (1)
FDP SumCourse Schedule July 2009 (1)
 
FDP
FDPFDP
FDP
 
FDP-libre(1)
FDP-libre(1)FDP-libre(1)
FDP-libre(1)
 
NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)
NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)
NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)
 
feedback_IIM_Indore
feedback_IIM_Indorefeedback_IIM_Indore
feedback_IIM_Indore
 
Proceedings
ProceedingsProceedings
Proceedings
 
cryptography_non_abeliean
cryptography_non_abelieancryptography_non_abeliean
cryptography_non_abeliean
 
testimonial-iit_1 (4)
testimonial-iit_1 (4)testimonial-iit_1 (4)
testimonial-iit_1 (4)
 
testimonial_iit_3 (3)
testimonial_iit_3 (3)testimonial_iit_3 (3)
testimonial_iit_3 (3)
 
NCM LECTURE NOTES ON I . n. herestein cryptography(3)
NCM LECTURE NOTES ON  I . n. herestein cryptography(3)NCM LECTURE NOTES ON  I . n. herestein cryptography(3)
NCM LECTURE NOTES ON I . n. herestein cryptography(3)
 
NCM LECTURE NOTES ON LATIN SQUARES(27)
NCM LECTURE NOTES ON LATIN SQUARES(27)NCM LECTURE NOTES ON LATIN SQUARES(27)
NCM LECTURE NOTES ON LATIN SQUARES(27)
 
japan-invite
japan-invitejapan-invite
japan-invite
 
kyoto-seminar
kyoto-seminarkyoto-seminar
kyoto-seminar
 
graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)
 
R.S.A Encryption
R.S.A EncryptionR.S.A Encryption
R.S.A Encryption
 
NCM Graph theory talk
NCM Graph theory talkNCM Graph theory talk
NCM Graph theory talk
 
NCM Latin squares talk
NCM Latin squares talkNCM Latin squares talk
NCM Latin squares talk
 

15

  • 1. International Journal of Pure and Applied Mathematics Volume 87 No. 2 2013, 349-354 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu doi: http://dx.doi.org/10.12732/ijpam.v87i2.15 PAijpam.eu AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION S. Srinivasan1, P. Muralikrishna2 §, N. Chandramowliswaran3 1,2School of Advanced Sciences VIT University Vellore, 632014, Tamilnadu. INDIA 3Visiting Faculty Indian Institute of Management Indore Indore, 453 331, INDIA Abstract: In resent years the security of operations taking place over a com- puter network become very important. It is necessary to protect such actions against bad users who may try to misuse the system (e.g. steal credit card numbers, read personal mail, or impersonate other users.) Many protocols and schemes were designed to solve problem of this type. Threshold cryptography is a novel cryptographic technique sharing secret among members. It divides a secret key into multiple shares by a cryptographic operation. In this paper, we proposed a key distribution algorithm based on Simple Continued Fraction. The goal of our algorithm is to divide a secret S into ℓ pieces s1 + s2 + · · · + sℓ such that, ℓ pieces are necessary to reconstruct S, but any m < ℓ pieces give no information about S. AMS Subject Classification: 94A60, 94A62 Key Words: simple continued fraction, shares, RSA prime 1. Introduction Secret sharing (also called secret splitting) refers to method for distributing a Received: June 15, 2013 c 2013 Academic Publications, Ltd. url: www.acadpubl.eu §Correspondence author
  • 2. 350 S. Srinivasan, P. Muralikrishna, N. Chandramowliswaran secret amongst a group of participants, each of whom is allocated a share of the secret. The secret can be reconstructed only when a sufficient number, of possibly different types, of shares are combined together; individual shares are of no use on their own. Secret sharing was invented independently by Adi Shamir [3] and George Blakley [1] in 1979. Secret sharing schemes are ideal for storing information that is highly sensitive and highly important. Examples include: encryption keys, missile launch codes and numbered bank accounts. Each of these pieces of information must be kept highly confidential, as their exposure could be disas- trous, however, it is also critical that they not be lost. Traditional methods for encryption are ill-suited for simultaneously achieving high levels of confidential- ity and reliability. This is because when storing the encryption key, one must choose between keeping a single copy of the key in one location for maximum secrecy, or keeping multiple copies of the key in different locations for greater reliability. Increasing reliability of the key by storing multiple copies lowers confidentiality by creating additional attack vectors; there are more opportu- nities for a copy to fall into the wrong hands. Secret sharing schemes address this problem, and allow arbitrarily high levels of confidentiality and reliability to be achieved. A secure secret sharing scheme distributes shares so that anyone with fewer than t shares has no extra information about the secret than someone with 0 shares. Consider for example the secret sharing scheme in which the secret phrase security is divided into the shares se−−−−−−, −−cu−−−−, −−−−ri−−, and −−−−−−ty. A person with 0 shares knows only that the password consists of eight letters. He would have to guess the password from 268 = 208 billion possible combinations. A person with one share, however, would have to guess only the six letters, from 266 = 308 million combinations, and so on as more persons collude. Consequently this system is not a secure secret sharing scheme, because a player with fewer than t secret-shares is able to reduce the problem of obtaining the inner secret without first needing to obtain all of the necessary shares. 2. Proposed Algorithms Construction of the Non-Homogeneous Equation Definition An expression of the form C0 + 1 C1+ 1 C2+ 1 C3+ . . . 1 +Cn . . . where Cj :
  • 3. AUTHENTICATED MULTIPLE KEY... 351 j ≥ 1 are positive integers and C0 is a non-negative integer is called a Simple Continued Fraction (SCF). • Define P1 Q1 = C0 1 P2 Q2 = C0 + 1 C1 = C0C1+1 C1 P3 Q3 = C0 + 1 C1+ 1 C2 = C0[C1C2+1]+C2 C1C2+1 • In general, we have Pn+1 Qn+1 = C0 + 1 C1+ 1 C2+ 1 C3+ . . . 1 +Cn (1) = C0 + 1 C1+ 1 C2+ 1 C3+···+ 1 Cn−1+ 1 Cn (2) then, Pn+1 Qn+1 is called (n + 1)th convergent of SCF • Let us denote C0 + 1 C1+ 1 C2+ 1 C3+ . . . 1 +Cn by [C0; C1, C2, C3, . . . , Cn−1, Cn] i.e., Pn+1 Qn+1 = [C0; C1, C2, C3, . . . , Cn−1, Cn] (3) • Alternatively, we can represent SCF as the product of special 2 × 2 ma- trices over non-negative integers C0 1 1 0 C1 1 1 0 . . . Cn 1 1 0 = Pn+1 Pn Qn+1 Qn (4) • Taking determinant on both sides of (4), we get (−1)n+1 = Pn+1Qn − Qn+1Pn for all n ≥ 1 (5) • Taking transpose of (4), we get Cn 1 1 0 Cn−1 1 1 0 . . . C0 1 1 0 = Pn+1 Qn+1 Pn Qn • Let R1, R2 be two given very large odd primes with R1 < R2 • Represent R1 R2 as a SCF R1 R2 = C0 + 1 C1+ 1 C2+ 1 C3+ . . . 1 +Cn = [C0; C1, C2, C3, . . . , Cn−1, Cn] (6) • Consider the symmetric continue fraction of length 2n + 2 P2n+2 Q2n+2 = [Cn; Cn−1, Cn−2, . . . , C1, C0, C0; C1, C2, C3, . . . , Cn−1, Cn] (7) where Pi Qi be the ith convergent of (7) • Pn+1 Qn+1 = [Cn; Cn−1, Cn−2, . . . , C1, C0] Pn Qn = [Cn; Cn−1, Cn−2, . . . , C1] Pn+1 Pn = [C0; C1, C2, C3, . . . , Cn−1, Cn] Qn+1 Qn = [C0; C1, C2, C3, . . . , Cn−1]
  • 4. 352 S. Srinivasan, P. Muralikrishna, N. Chandramowliswaran • Therefore Cn 1 1 0 Cn−1 1 1 0 . . . C1 1 1 0 C0 1 1 0 C0 1 1 0 C1 1 1 0 . . . Cn 1 1 0 = P2n+2 P2n+1 Q2n+2 Q2n+1 =A (8) • Clearely, det(A) = (−1)2n+2 = 1 • Consider Cn 1 1 0 Cn−1 1 1 0 . . . C1 1 1 0 C0 1 1 0 C0 1 1 0 C1 1 1 0 . . . Cn 1 1 0 = [Cn; Cn−1, . . . , C1, C0, C0; C1, C2, . . . , Cn−1Cn] = Pn+1 Pn Qn1 Qn Pn+1 Qn+1 Pn Qn = P 2 n+1+P 2 n Pn+1Qn+1+PnQn Pn+1Qn+1+PnQn Q2 n+1+Q2 n = P2n+2 P2n+1 Q2n+2 Q2n+1 • P2n+2Q2n+1 − P2n+1Q2n+2 = 1 (P2 n+1 + P2 n )Q2n+1 = P2 2n+1 + 1 (R2 1 + R2 2)Y = X2 + 1 where Pn+1 = R1, Pn = R2, P2n+1 = X and Q2n+1 = Y Here, we proposed an algorithm and its actual implementation. Our pri- mary contribution is that, in our algorithm we discussed the key sharing by using two prime numbers and a non-homogeneous equation with two variables. The share holders can verify the validity of their shares only after reconstruc- tion of the secret and any share holders fewer than ℓ, can not reconstruct the secret. Algorithm for Encryption • Choose two secret very large odd primes R1, R2 with R1 > R2 • Construct x2 + 1 = (R2 1 + R2 2)y • Select two large RSA secret odd primes p and q • Define N = pq then φ(N) = (p − 1)(q − 1) where φ(N) is Euler phi function • Select a secret exponent e such that (e, φ(N)) = 1 where 1 < e < φ(N) • For this e, there is a unique d such that ed ≡ 1(mod φ(N))
  • 5. AUTHENTICATED MULTIPLE KEY... 353 • consider a = (R2 1 + R2 2)(y + d) − (x + φ(N))2 a = (R2 1 + R2 2)y − x2 + (R2 1 + R2 2)d − [φ(N)]2 − 2xφ(N) = 1 + (R2 1 + R2 2)d − [φ(N)]2 − 2xφ(N) a ≡ (1 + (R2 1 + R2 2)d) (mod φ(N)) ae ≡ (e + (R2 1 + R2 2)) (mod φ(N)) S ≡ e(mod φ(N)) where S = ae − (R2 1 + R2 2) • Here we define S is the exponent secret • Represent the secret message m in the interval [0, N − 1] with gcd(m, N) = 1 Algorithm for Key Sharing • Consider the ℓ exponent secret partition (share holders) S = s1 + s2 + · · · + sℓ Define Yi ≡ msi (mod N) for 1 ≤ i ≤ ℓ ℓ 1 Yi ≡ mS(mod N) ≡ ms1+s2+···+sℓ (mod N) ≡ ms1 ms2 . . . msℓ (mod N) • For ℓ secret share holders we can distribute ℓ key’s such as Y1, Y2, . . . , Yℓ • Sharing scheme follows from the given equations: ℓ 1 Yi ≡ mS(mod N)
  • 6. 354 S. Srinivasan, P. Muralikrishna, N. Chandramowliswaran ≡ mkφ(N)+e(mod N) ≡ mkφ(N)me(mod N) ≡ [mφ(N)]kme(mod N) ℓ 1 Yi ≡ me(mod N) • High Level Authentication Key manager is d ( ℓ 1 Yi)d ≡ (me)d(mod N) ( ℓ 1 Yi)d ≡ m(mod N) 3. Conclusion This paper dealt with a secret key sharing mechanism on ℓ share holders. Ac- cording to the algorithm, the secret can be well shared with feasible sense, it may have some performance impact when the number of share holders is ac- cordingly increased. Our approach to secret sharing is opened a number of avenues for future work. These include research into finding schemes that will remove the restrictions on the size of ℓ. These schemes make it possible to store secret information in a network. References [1] Adi Shamir, How to share a secret, Communications of the ACM, 22, No. 11 (1979), 612-613. [2] A. Beimel, Secret-sharing schemes: a survey, In: Proceedings of the Third International Conference on Coding and Cryptology, Berlin, Heidelberg, 2011, Springer-Verlag, IWCC’11, 11-46. [3] G.R. Blakley, Safeguarding cryptographic keys, Proceedings of the National Computer Conference, 48 (1979), 313-317. [4] P. Muralikrishna, S. Srinivasan, N. Chandramowliswaran, Secure schemes for secret sharing and key distribution using Pell’s equation, Interna- tional Journal of Pure and Applied Mathematics, 85, No. 5, 33-937, doi: 10.12732/ijpam.v85i5.11. [5] Ivan Niven, Herbert S. Zuckerman, Hugh L. Montgomery, An Introduction to the Theory of Numbers, John Wiley. [6] Tom M. Apostol, Introduction to Analytic Number Theory, Springer.