SlideShare a Scribd company logo
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
DOI : 10.5121/ijnsa.2011.3204 43
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH
HIGHER ORDER DIOPHANTINE EQUATIONS
Harry Yosh
HECO Ltd, Canberra, Australia
square17320508@yahoo.com
ABSTRACT
One-way functions are widely used for encrypting the secret in public key cryptography, although they
are regarded as plausibly one-way but have not been proven so.
Here we discuss the public key cryptosystem based on the system of higher order Diophantine equations.
In this system those Diophantine equations are used as public keys for sender and recipient, and both
sender and recipient can obtain the shared secret through a trapdoor, while attackers must solve those
Diophantine equations without trapdoor. Thus the scheme of this cryptosystem might be considered to
represent a possible one-way function.
We also discuss the problem on implementation, which is caused from additional complexity necessary
for constructing Diophantine equations in order to prevent from attacking by tamperers.
KEYWORDS
public-key cryptography, one-way function, Diophantine equation, quotient ring, NP-complete
1. INTRODUCTION
Since the public-key cryptography introduced by Diffie and Hellman,[1] various public-
key cryptosystems based on integer factorization or discrete logarithm such as RSA, El Gamal,
or those using elliptic curve techniques have been developed.[2] They obtain the computational
security by using the sufficiently large key which imposes the attackers too heavy
computational cost to decipher through solving integer factorization or discrete logarithm
problems. Although no polynomial-time method for factoring large integers or solving the
discrete logarithm problem has been known, it has not been proven that there exist no
polynomial-time solutions for those problems.[3] Therefore the cryptosystems which are
proven that there is no polynomial-time solution for attackers are thought to be significantly
secure against their attacks.
Here a new cryptosystem is discussed. In this cryptosystem the public key for recipient is
expressed with Diophantine equation and his/her private key is expressed with a value on the
quotient ring defined with another Diophantine equation.
A Diophantine equation has plural unknown variables and defines an algebraic curve or
algebraic surface. It is know to find the lattice points as the solutions of Diophantine equation is
difficult in general when the order of that Diophantine equation is higher than one.[7] This
difficulty is derived from that the equation may have no nontrivial solution, a finite number or
an infinite number of solutions. Regarding its solvability, there is no general method to
determine by a finite number of operations whether the equation is solvable or not.[8] However
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
44
these properties of Diophantine equation are also useful for encrypting message to keep it secret
and have been applied to some public key cryptosystems.[9][10] For example, the cryptosystem
proposed by Lin, et al. is based on that the Diophantine equation dealt with in the system is
practically non-soluble.[11] Precisely saying, the practically non-soluble Diophantine equation
mentioned here indicates that there is no algorithm for solving it running in polynomial time.
However it has been revealed that some alternative methods such as using AI[12], A*
search[13] or genetic algorithm[14] are effective for solving numerically some specific types of
Diophantine equation. It implies the cryptosystem built on a certain type of Diophantine
equation might be broken within polynomial time by using those methods.
On the other hand, on the cryptosystem proposed here both sender and recipient can
choose the form of Diophantine equation arbitrary. Therefore they can avoid the use of the
specific types of Diophantine equation which are vulnerable to the methods mentioned above.
The Diophantine equation used for recipient's public key is given by sender who has the
trapdoor which is explained later and he/she can recovers the shared secret with that trapdoor,
while attackers who have obtained the Diophantine equations as public keys for sender and
recipient must solve them without the trapdoor. Thus this cryptosystem is expected to have the
computational security stemmed from the difficulty of Diophantine problem.
In the following sections we discuss the basic idea for that cryptosystem, practical scheme
and hardness of decryption by attackers. Also positive and negative aspects comparing with
other cryptosystems are discussed.
2. KEY EXCHANGE SCHEME
Firstly we discuss the basic idea on this key exchange scheme using examples. To simplify
the discussion we use simpler Diophantine equations and quotient ring in the following
examples than those used in practical cases.
This key exchange scheme begins from the recipient side. The recipient sets the integer values
of variables, say, x, y as x = 2, y = 3. Using those variables the recipient constructs a
Diophantine equation such as,
x3
– y2
+ 1 = 0
1)
The recipient sends the information of that Diophantine equation to sender with keeping the
values of x and y secret. The above Diophantine equation (1) is the public key and x, y are the
private keys for recipient.
Sender constructs the polynomial as Diophantine equation on the quotient ring Z[X,Y] /
(X3
– Y2
+ 1) through the following procedures; Firstly the sender defines the following
operator on that quotient ring.
T[a,b;c] : x → (x + a) c
+ b
2)
where a, b are integers and c is odd (c > 0). The inverse operator for it is given as,
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
45
T[a,b;c]
-1
: y → (y – b)1/c
– a
3)
Sender then sets an element on the quotient ring, say xy2
, and applies the operator (2)
repeatedly to that element as,
T[a1,b1;c1] (T[a2,b2;c2] (...(T[an,bn;cn] (xy2
))...) = T[a1,b1;c1] T[a2,b2;c2] ... T[an,bn;cn]
(xy2
)
= h(x,y)
4)
where h(x,y) is an element in Z[X,Y] / (X3
– Y2
+ 1). For example,
T[1,2;3] T[0,3;1] (xy2
) = T[1,2;3] (xy2
+ 3)
= (xy2
+ 4)3
+ 2 = x3
y6
+ 12x2
y4
+ 48xy2
+ 66
5)
Sender keeps the parameters in the operators (i.e. 1, 2, 3 and 0, 3, 1 in T[1,2;3] and T[0,3;1] ) secret.
Those parameters are the private keys for sender and actually form a "trapdoor". x3
y6
+ 12x2
y4
+
48xy2
+ 66 is expressed with various ways in Z[X,Y] / (X3
– Y2
+ 1). Sender chooses one of
those representations, say, (y2
– 1) y6
+ 12x2
y4
+ 48xy2
+ 66 = y8
– y6
+ 12x2
y4
+ 48xy2
+ 66 and
sends it with xy2
to the recipient. The form of polynomial y8
– y6
+ 12x2
y4
+ 48xy2
+ 66 is the
public key for sender.
Recipient calculates y8
– y6
+ 12x2
y4
+ 48xy2
+ 66 and xy2
using his/her private keys x = 2,
y = 3 as,
y8
– y6
+ 12x2
y4
+ 48xy2
+ 66 = 10650
6)
xy2
= 18
7)
and returns the value 10650 to sender with keeping xy2
= 18 secret. The Diophantine equation
(6) is another public key for recipient, and the value of xy2
is actually the shared secret between
sender and recipient as shown below; Sender calculates xy2
using the inverse operators as,
T[0,3:1]
-1
T[1,2:3]
-1
(10650) = T[0,3:1]
-1
((10650 – 2)1/3
– 1)
= T[0,3:1]
-1
(21) = (21 – 3) – 0 = 18
8)
and sender could recover the value of xy2
as 18.
Attackers who have had the public keys for both sender and recipient must solve the
following system of equations to obtain the value of xy2
.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
46
x3
– y2
+ 1 = 0
9)
y8
– y6
+ 12x2
y4
+ 48xy2
+ 66 = 10650
10)
Since the above system is zero-dimensional, the attackers can solve it numerically or using
Groebner basis.[5] However when the number of variables are greater than two, or the system
is positive-dimensional, solving it is difficult in general.[6]
Based on the above discussion, we construct the general scheme for the key exchange
cryptosystem.
Step 1
Recipient sets the integer values of variables x1, x2, ... , xm as,
x1 = k1, x2 = k2, ... , xm = km (kj : integers)
11)
and constructs Diophantine equation as recipient's public key using those variables as,
f(x1, x2, ... , xm) = 0
12)
Recipient keeps k1, k2, ... , km secret.
Step 2
Recipient sends the above Diophantine equation (12) to sender.
Step 3
Sender sets an element g(x1, x2, ... , xm) in the quotient ring Z[X1, X2, ... , Xm] / (f(X1, X2, ... ,
Xm)) and defines the operators T[aj,bj:cj] (j = 1, ... , n) on that quotient ring as,
T[aj,bj:cj] : x → (x + aj) cj
+ bj
13)
where aj, bj are integers and cj is odd (cj > 0). Then the sender applies those operators to g(x1,
x2, ... , xm) as,
T[a1,b1:c1] (T[a2,b2:c2] ( ... (T[an,bn:cn] (g(x1, x2, ... , xm))) ... )
= T[a1,b1:c1] T[a2,b2:c2] ... T[an,bn:cn] (g(x1, x2, ... , xm))
= h(x1, x2, ... , xm)
14)
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
47
where h(x1, x2, ... , xm) is an element in Z[X1, X2, ... , Xm] / (f(X1, X2, ... , Xm)) and has generally
various representations. Sender chooses one of them as his/her public key.
Step 4
Sender sends the public key h(x1, x2, ... , xm) chosen in the previous step with the form g(x1, x2,
... , xm) to recipient.
Step 5
Recipient calculates h(x1, x2, ... , xm) = p and g(x1, x2, ... , xm) = s using (11) where p and s are
some integers.
Step 6
Recipient sends back the value p to sender with keeping the value s secret.
Step 7
Sender recovers the value s of g(x1, x2, ... , xm) as,
s = T[an,bn:cn]
-1
T[an-1,bn-1:cn-1]
-1
... T[a1,b1:c1]
-1
(p)
15)
Thus sender and recipient could share the secret s.
The parameter c in the operator T[a,b:c] must be odd, otherwise the image of inverse
operator;
T[a,b;c]
-1
: y → (y – b)1/c
– a
16)
may not be determined uniquely and it causes the ambiguity on the obtained secret s.
It is possible to modify the above scheme to that on finite ring. In that case the
Diophantine equation (12) is modified to a congruence equation with modulus w and the
quotient ring is rewritten as,
Zw [X1, X2, ... , Xm] / (f(X1, X2, ... , Xm))
17)
where Zw is the quotient ring composed of 0, 1, ... , w-1. The operator defined in Step 3 is
modified as,
T[a,b:c] : x → (x + a) c
+ b mod w
18)
and its inverse operator is expressed as,
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
48
T[a,b;c]
-1
: y → (y – b) c'
– a mod w
19)
where cc' = 1 mod ϕ(w) (ϕ(w): Euler's totient function).
3. HARDNESS OF DECRYPTION FOR ATTACKERS
Attackers who have had the public information of sender and recipient are to solve the
following system of two Diophantine equations;
f(x1, x2, ... , xm) = 0 ... in Step 1
20)
h(x1, x2, ... , xm) = p ... in Step 5
21)
and estimate the secret s = g(x1, x2, ... , xm) with the obtained solution. As mentioned in earlier
section, it is difficult to solve (20) and (21) in integers when m is greater than two in general.
As another strategy, attackers may consider to decipher the sequence of operators appeared
in Step 3;
T[a1,b1:c1] T[a2,b2:c2] ... T[an,bn:cn] (g(x1, x2, ... , xm)) = h(x1, x2, ... , xm)
22)
by using (20) and (21). Once the above sequence has been deciphered, attackers can estimate
the secret s = g(x1, x2, ... , xm) applying the inverse sequence of the above sequence. However
the highest order among x1, x2, ... , xm in h(x1, x2, ... , xm) becomes greater in general along with
the increase of the iteration number n expressed in (22). Since the greater the highest order is,
the more equivalent expressions in the quotient ring Z[X1, X2, ... , Xm] / (f(X1, X2, ... , Xm)) are,
it is also virtually impossible to decipher the sequence of operators (22) unless attackers have
known the iteration number n previously or the Diophantine equation (12) is linear.
When the system of higher order congruence equations are used for the scheme instead of
Diophantine equations (20) and (21) as mentioned in earlier section, the size of secret key is
generally determined by that of modulus w. Although the solution space for the system of
congruence equations is finite, obtaining the secret s is still difficult for attackers because in
general the problem to solve such system of higher order congruence equations is NP-complete
when m > 2.[4]
4. PRO AND CON
Attackers must solve the system of Diophantine equations to estimate the shared secret
between sender and recipient. Generally it is hard to solve that system when it is positive-
dimensional. Attackers also subject the similar constraint on the corresponding higher order
congruence equation system. That feature brings the proven security which does not depend on
the performance of attackers' computational capacity. Namely sender and recipient can choose
the public keys which have the length shorter than that of public keys used for other
cryptosystems without harming the security, and the shorter length of public keys would
alleviate the computational load considerably.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
49
Comparing with other key exchange cryptosystem such as RSA or Diffie-Hellman scheme,
this cryptosystem needs additional key exchange step, that is, recipient must tell a Diophantine
equation from which the quotient ring is constructed to sender prior to key exchange between
them. It may increase the vulnerability regarding the security on this key exchange
cryptosystem.
Sender and recipient exchange Diophantine equations as their public keys. Although
sender and recipient can choose their Diophantine equations arbitrary, some specific
considerations are required to construct those Diophantine equations practically in the actual
key exchange scheme as discussed below.
Firstly in Step 1 described in the section: Key exchange scheme, the Diophantine equation
(12) must be constructed carefully to avoid the case that it has unique solution, otherwise as
soon as solving that equation, attackers get the secret keys expressed in (11). Next in Step 3, the
Diophantine equation (14) must not have unique solution as well as (12), also it must be
complicated enough to prevent from inferring the sequence of operators used for constructing
(14) by attackers. It is not practical that the above Diophantine equations are constructed
manually by sender and recipient in general cases, and it will be necessary to implement
appropriate programs into that cryptosystem to generate those equations automatically based on
the values of variables x1, x2, ... , xm set in Step 1, and aj, bj, cj and n set in Step 3. To prevent
from breaking the patterns of generating them by attackers, the forms of Diophantine equations
determined by those programs must not be static, but dynamically change according with the
input, or randomly. Thus the implementation of this cryptosystem will impose additional
calculation load for them with that for dealing with the Diophantine equations symbolically.
5. SUMMARY
In the proposed key exchange cryptosystem the system of two higher order Diophantine
equations is considered for encrypting shared secret between sender and recipient.
The first Diophantine equation is created by recipient and sender creates another
Diophantine equation on the quotient ring based on the first Diophantine equation. The shared
secret has the form of polynomial and both sender and recipient can obtain its value by a
trapdoor without solving the system of those Diophantine equations explicitly.
On the other hand, attackers must solve the following system of two Diophantine
equations mentioned above in order to obtain the secret.
f(x1, x2, ... , xm) = 0
23)
h(x1, x2, ... , xm) = p
24)
In general it is hard to solve the above system in integers for x1, x2, ... , xm when m is greater
than two.
Although this key exchange cryptosystem has the intrinsic security mentioned above, it
requires rather complicated implementation comparing with other key exchange cryptosystems.
International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011
50
This complexity is due to generate Diophantine equations used as public keys with
unpredictable manner lest attackers detect the pattern of their generations. The specifically
designed program must be implemented in the cryptosystem for that purpose.
REFERENCES
[1] W. Diffie and M. E. Hellman, New Directions in Cryptography. IEEE Transactions on
Information Theory, vol. IT-22, pp. 644-654, Nov. 1976.
[2] D. Knuth, The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Third
Edition. Addison-Wesley, 1997.
[3] M. Sipser, Introduction to the Theory of Computation. PWS Publishing, pp. 374-376, 1997.
[4] M. R. Garey, D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-
Completeness. W. H. Freeman, 1979.
[5] B. Buchberger, An algorithmic criterion for the solvability of algebraic systems of equations.
Aequationes Math., 4, pp. 374-383, 1965.
[6] Yu. I. Manin, Hilbert's tenth problem. J. Soviet Math., 3 : 1, pp. 164-184, 1975.
[7] H. Cohen, Number Theory, Vol. I: Tools and Diophantine Equations and Vol. II: Analytic and
Modern Tools. Springer-Verlag, GTM 239, 240, 2007.
[8] Y. V. Matiyasevich, Hilbert’s Tenth Problem. MIT press, 1993.
[9] C. S. Laih, et al, Cryptanalysis of Diophantine equation oriented public key cryptosystem. IEEE
Transactions on Computers, Vol 46, April, 1997.
[10] H. Ong, C. Schnorr, A. Shamir, An efficient signature scheme based on polynomial equations.
Proc. of CRYPTO, pp 37–46, 1985.
[11] C. H. Lin, C. C. Chang, R. C. T. Lee, A New Public-Key Cipher System Based Upon the
Diophantine Equations. IEEE Transactions on Computers, Volume 44, Issue 1, 1995.
[12] G. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem solving. 4e
Pearson Education, 2006.
[13] S. Abraham, and M. Sanglikar, A* Search for a Challenging Problem. Proceedings of the 3rd
International Conference on Mathematics and Computer Science held at Loyola College,
Chennai, 5th- 6th January 2009.
[14] Z. Michalewich, GA + Data Structures = Evaluation Programs. Springer Verlag, 1992
Author
Harry Yosh is a knowledge manager at HECO Ltd. He is also a data analyst at APA Group,
Canberra, having graduated from University of Canberra with a Master of IT. His hobbies are
traveling and swimming.
Paper: Harry Yosh, General Addition Formula for Meromorphic Functions Derived from
Residue Theorem. Journal of Mathematical Physics, Analysis, Geometry, v. 6, No 2, p.
183-191, 2010. (http://jmage.ilt.kharkov.ua/abstract.php?uid=jm06-0183e)

More Related Content

What's hot

Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
Alexandre Augusto Giron
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
Vaibhav Khanna
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
Akash Kamble
 
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
IJNSA Journal
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
Sayantan Sur
 
A survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic EncryptionA survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic Encryption
iosrjce
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
Mohammed Ashour
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
Rajan Shah
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
karthik kedarisetti
 
IRJET- Data Analysis for Braking System in Time Domain for Fault Diagnosis
IRJET- Data Analysis for Braking System in Time Domain for Fault DiagnosisIRJET- Data Analysis for Braking System in Time Domain for Fault Diagnosis
IRJET- Data Analysis for Braking System in Time Domain for Fault Diagnosis
IRJET Journal
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
TELKOMNIKA JOURNAL
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
snv09
 
05 directnets errors
05 directnets errors05 directnets errors
05 directnets errors
jyang1983
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
CRC JAVA CODE
CRC JAVA CODECRC JAVA CODE
CRC JAVA CODE
sandeep101026
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
IAEME Publication
 
Development of anonymous networks based on cryptography
Development of anonymous networks based on cryptographyDevelopment of anonymous networks based on cryptography
Development of anonymous networks based on cryptography
Md. Hasibur Rashid
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
IJERD Editor
 

What's hot (20)

Introduction - Lattice-based Cryptography
Introduction - Lattice-based CryptographyIntroduction - Lattice-based Cryptography
Introduction - Lattice-based Cryptography
 
Information and network security 33 rsa algorithm
Information and network security 33 rsa algorithmInformation and network security 33 rsa algorithm
Information and network security 33 rsa algorithm
 
Cloud computing and security final
Cloud computing and security finalCloud computing and security final
Cloud computing and security final
 
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEMLITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
A survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic EncryptionA survey on Fully Homomorphic Encryption
A survey on Fully Homomorphic Encryption
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
Cyclic Redundancy Check
Cyclic Redundancy CheckCyclic Redundancy Check
Cyclic Redundancy Check
 
Image encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipherImage encryption using elliptical curve cryptosytem with hill cipher
Image encryption using elliptical curve cryptosytem with hill cipher
 
IRJET- Data Analysis for Braking System in Time Domain for Fault Diagnosis
IRJET- Data Analysis for Braking System in Time Domain for Fault DiagnosisIRJET- Data Analysis for Braking System in Time Domain for Fault Diagnosis
IRJET- Data Analysis for Braking System in Time Domain for Fault Diagnosis
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
 
Criptography approach using magnets
Criptography approach using magnetsCriptography approach using magnets
Criptography approach using magnets
 
05 directnets errors
05 directnets errors05 directnets errors
05 directnets errors
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
CRC JAVA CODE
CRC JAVA CODECRC JAVA CODE
CRC JAVA CODE
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Development of anonymous networks based on cryptography
Development of anonymous networks based on cryptographyDevelopment of anonymous networks based on cryptography
Development of anonymous networks based on cryptography
 
A New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AESA New hybrid method in watermarking using DCT and AES
A New hybrid method in watermarking using DCT and AES
 

Similar to THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS

Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
IJCNCJournal
 
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring ProblemsA Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
Sandra Long
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...
ijtsrd
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
IJEACS
 
Distributed Beamforming in Sensor Networks
Distributed Beamforming in Sensor NetworksDistributed Beamforming in Sensor Networks
Distributed Beamforming in Sensor Networks
Daniel Tai
 
Identity-based threshold group signature scheme based on multiple hard number...
Identity-based threshold group signature scheme based on multiple hard number...Identity-based threshold group signature scheme based on multiple hard number...
Identity-based threshold group signature scheme based on multiple hard number...
IJECEIAES
 
I1803014852
I1803014852I1803014852
I1803014852
IOSR Journals
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
Editor IJCATR
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
IJTRET-International Journal of Trendy Research in Engineering and Technology
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
Sarun Maksuanpan
 
5 1-10
5 1-105 1-10
5 1-10
idescitation
 
Rsa
RsaRsa
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
nooriasukmaningtyas
 
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
cscpconf
 
Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...
csandit
 
B017631014
B017631014B017631014
B017631014
IOSR Journals
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
TELKOMNIKA JOURNAL
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
ChandraB15
 
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...
IJCNCJournal
 

Similar to THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS (20)

Lightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETSLightweight Cryptography for Distributed PKI Based MANETS
Lightweight Cryptography for Distributed PKI Based MANETS
 
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring ProblemsA Signature Algorithm Based On Chaotic Maps And Factoring Problems
A Signature Algorithm Based On Chaotic Maps And Factoring Problems
 
A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...A Novel Design Architecture of Secure Communication System with Reduced-Order...
A Novel Design Architecture of Secure Communication System with Reduced-Order...
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Distributed Beamforming in Sensor Networks
Distributed Beamforming in Sensor NetworksDistributed Beamforming in Sensor Networks
Distributed Beamforming in Sensor Networks
 
Identity-based threshold group signature scheme based on multiple hard number...
Identity-based threshold group signature scheme based on multiple hard number...Identity-based threshold group signature scheme based on multiple hard number...
Identity-based threshold group signature scheme based on multiple hard number...
 
I1803014852
I1803014852I1803014852
I1803014852
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGEDATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE  FOR SECURE CLOUD STORAGE
DATA INTEGRITY AUDITING WITHOUT PRIVATE KEY STORAGE FOR SECURE CLOUD STORAGE
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
 
5 1-10
5 1-105 1-10
5 1-10
 
Rsa
RsaRsa
Rsa
 
Chaotic systems with pseudorandom number generate to protect the transmitted...
Chaotic systems with pseudorandom number generate to  protect the transmitted...Chaotic systems with pseudorandom number generate to  protect the transmitted...
Chaotic systems with pseudorandom number generate to protect the transmitted...
 
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
SECURED WIRELESS COMMUNICATION THROUGH SIMULATED ANNEALING GUIDED TRAINGULARI...
 
Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...Secured wireless communication through simulated annealing guided traingulari...
Secured wireless communication through simulated annealing guided traingulari...
 
B017631014
B017631014B017631014
B017631014
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-...
 

Recently uploaded

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
KrishnaveniKrishnara1
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
HODECEDSIET
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
abbyasa1014
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
IJECEIAES
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 

Recently uploaded (20)

IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.pptUnit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
Unit-III-ELECTROCHEMICAL STORAGE DEVICES.ppt
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMTIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEM
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
Engineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdfEngineering Drawings Lecture Detail Drawings 2014.pdf
Engineering Drawings Lecture Detail Drawings 2014.pdf
 
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 

THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 DOI : 10.5121/ijnsa.2011.3204 43 THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS Harry Yosh HECO Ltd, Canberra, Australia square17320508@yahoo.com ABSTRACT One-way functions are widely used for encrypting the secret in public key cryptography, although they are regarded as plausibly one-way but have not been proven so. Here we discuss the public key cryptosystem based on the system of higher order Diophantine equations. In this system those Diophantine equations are used as public keys for sender and recipient, and both sender and recipient can obtain the shared secret through a trapdoor, while attackers must solve those Diophantine equations without trapdoor. Thus the scheme of this cryptosystem might be considered to represent a possible one-way function. We also discuss the problem on implementation, which is caused from additional complexity necessary for constructing Diophantine equations in order to prevent from attacking by tamperers. KEYWORDS public-key cryptography, one-way function, Diophantine equation, quotient ring, NP-complete 1. INTRODUCTION Since the public-key cryptography introduced by Diffie and Hellman,[1] various public- key cryptosystems based on integer factorization or discrete logarithm such as RSA, El Gamal, or those using elliptic curve techniques have been developed.[2] They obtain the computational security by using the sufficiently large key which imposes the attackers too heavy computational cost to decipher through solving integer factorization or discrete logarithm problems. Although no polynomial-time method for factoring large integers or solving the discrete logarithm problem has been known, it has not been proven that there exist no polynomial-time solutions for those problems.[3] Therefore the cryptosystems which are proven that there is no polynomial-time solution for attackers are thought to be significantly secure against their attacks. Here a new cryptosystem is discussed. In this cryptosystem the public key for recipient is expressed with Diophantine equation and his/her private key is expressed with a value on the quotient ring defined with another Diophantine equation. A Diophantine equation has plural unknown variables and defines an algebraic curve or algebraic surface. It is know to find the lattice points as the solutions of Diophantine equation is difficult in general when the order of that Diophantine equation is higher than one.[7] This difficulty is derived from that the equation may have no nontrivial solution, a finite number or an infinite number of solutions. Regarding its solvability, there is no general method to determine by a finite number of operations whether the equation is solvable or not.[8] However
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 44 these properties of Diophantine equation are also useful for encrypting message to keep it secret and have been applied to some public key cryptosystems.[9][10] For example, the cryptosystem proposed by Lin, et al. is based on that the Diophantine equation dealt with in the system is practically non-soluble.[11] Precisely saying, the practically non-soluble Diophantine equation mentioned here indicates that there is no algorithm for solving it running in polynomial time. However it has been revealed that some alternative methods such as using AI[12], A* search[13] or genetic algorithm[14] are effective for solving numerically some specific types of Diophantine equation. It implies the cryptosystem built on a certain type of Diophantine equation might be broken within polynomial time by using those methods. On the other hand, on the cryptosystem proposed here both sender and recipient can choose the form of Diophantine equation arbitrary. Therefore they can avoid the use of the specific types of Diophantine equation which are vulnerable to the methods mentioned above. The Diophantine equation used for recipient's public key is given by sender who has the trapdoor which is explained later and he/she can recovers the shared secret with that trapdoor, while attackers who have obtained the Diophantine equations as public keys for sender and recipient must solve them without the trapdoor. Thus this cryptosystem is expected to have the computational security stemmed from the difficulty of Diophantine problem. In the following sections we discuss the basic idea for that cryptosystem, practical scheme and hardness of decryption by attackers. Also positive and negative aspects comparing with other cryptosystems are discussed. 2. KEY EXCHANGE SCHEME Firstly we discuss the basic idea on this key exchange scheme using examples. To simplify the discussion we use simpler Diophantine equations and quotient ring in the following examples than those used in practical cases. This key exchange scheme begins from the recipient side. The recipient sets the integer values of variables, say, x, y as x = 2, y = 3. Using those variables the recipient constructs a Diophantine equation such as, x3 – y2 + 1 = 0 1) The recipient sends the information of that Diophantine equation to sender with keeping the values of x and y secret. The above Diophantine equation (1) is the public key and x, y are the private keys for recipient. Sender constructs the polynomial as Diophantine equation on the quotient ring Z[X,Y] / (X3 – Y2 + 1) through the following procedures; Firstly the sender defines the following operator on that quotient ring. T[a,b;c] : x → (x + a) c + b 2) where a, b are integers and c is odd (c > 0). The inverse operator for it is given as,
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 45 T[a,b;c] -1 : y → (y – b)1/c – a 3) Sender then sets an element on the quotient ring, say xy2 , and applies the operator (2) repeatedly to that element as, T[a1,b1;c1] (T[a2,b2;c2] (...(T[an,bn;cn] (xy2 ))...) = T[a1,b1;c1] T[a2,b2;c2] ... T[an,bn;cn] (xy2 ) = h(x,y) 4) where h(x,y) is an element in Z[X,Y] / (X3 – Y2 + 1). For example, T[1,2;3] T[0,3;1] (xy2 ) = T[1,2;3] (xy2 + 3) = (xy2 + 4)3 + 2 = x3 y6 + 12x2 y4 + 48xy2 + 66 5) Sender keeps the parameters in the operators (i.e. 1, 2, 3 and 0, 3, 1 in T[1,2;3] and T[0,3;1] ) secret. Those parameters are the private keys for sender and actually form a "trapdoor". x3 y6 + 12x2 y4 + 48xy2 + 66 is expressed with various ways in Z[X,Y] / (X3 – Y2 + 1). Sender chooses one of those representations, say, (y2 – 1) y6 + 12x2 y4 + 48xy2 + 66 = y8 – y6 + 12x2 y4 + 48xy2 + 66 and sends it with xy2 to the recipient. The form of polynomial y8 – y6 + 12x2 y4 + 48xy2 + 66 is the public key for sender. Recipient calculates y8 – y6 + 12x2 y4 + 48xy2 + 66 and xy2 using his/her private keys x = 2, y = 3 as, y8 – y6 + 12x2 y4 + 48xy2 + 66 = 10650 6) xy2 = 18 7) and returns the value 10650 to sender with keeping xy2 = 18 secret. The Diophantine equation (6) is another public key for recipient, and the value of xy2 is actually the shared secret between sender and recipient as shown below; Sender calculates xy2 using the inverse operators as, T[0,3:1] -1 T[1,2:3] -1 (10650) = T[0,3:1] -1 ((10650 – 2)1/3 – 1) = T[0,3:1] -1 (21) = (21 – 3) – 0 = 18 8) and sender could recover the value of xy2 as 18. Attackers who have had the public keys for both sender and recipient must solve the following system of equations to obtain the value of xy2 .
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 46 x3 – y2 + 1 = 0 9) y8 – y6 + 12x2 y4 + 48xy2 + 66 = 10650 10) Since the above system is zero-dimensional, the attackers can solve it numerically or using Groebner basis.[5] However when the number of variables are greater than two, or the system is positive-dimensional, solving it is difficult in general.[6] Based on the above discussion, we construct the general scheme for the key exchange cryptosystem. Step 1 Recipient sets the integer values of variables x1, x2, ... , xm as, x1 = k1, x2 = k2, ... , xm = km (kj : integers) 11) and constructs Diophantine equation as recipient's public key using those variables as, f(x1, x2, ... , xm) = 0 12) Recipient keeps k1, k2, ... , km secret. Step 2 Recipient sends the above Diophantine equation (12) to sender. Step 3 Sender sets an element g(x1, x2, ... , xm) in the quotient ring Z[X1, X2, ... , Xm] / (f(X1, X2, ... , Xm)) and defines the operators T[aj,bj:cj] (j = 1, ... , n) on that quotient ring as, T[aj,bj:cj] : x → (x + aj) cj + bj 13) where aj, bj are integers and cj is odd (cj > 0). Then the sender applies those operators to g(x1, x2, ... , xm) as, T[a1,b1:c1] (T[a2,b2:c2] ( ... (T[an,bn:cn] (g(x1, x2, ... , xm))) ... ) = T[a1,b1:c1] T[a2,b2:c2] ... T[an,bn:cn] (g(x1, x2, ... , xm)) = h(x1, x2, ... , xm) 14)
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 47 where h(x1, x2, ... , xm) is an element in Z[X1, X2, ... , Xm] / (f(X1, X2, ... , Xm)) and has generally various representations. Sender chooses one of them as his/her public key. Step 4 Sender sends the public key h(x1, x2, ... , xm) chosen in the previous step with the form g(x1, x2, ... , xm) to recipient. Step 5 Recipient calculates h(x1, x2, ... , xm) = p and g(x1, x2, ... , xm) = s using (11) where p and s are some integers. Step 6 Recipient sends back the value p to sender with keeping the value s secret. Step 7 Sender recovers the value s of g(x1, x2, ... , xm) as, s = T[an,bn:cn] -1 T[an-1,bn-1:cn-1] -1 ... T[a1,b1:c1] -1 (p) 15) Thus sender and recipient could share the secret s. The parameter c in the operator T[a,b:c] must be odd, otherwise the image of inverse operator; T[a,b;c] -1 : y → (y – b)1/c – a 16) may not be determined uniquely and it causes the ambiguity on the obtained secret s. It is possible to modify the above scheme to that on finite ring. In that case the Diophantine equation (12) is modified to a congruence equation with modulus w and the quotient ring is rewritten as, Zw [X1, X2, ... , Xm] / (f(X1, X2, ... , Xm)) 17) where Zw is the quotient ring composed of 0, 1, ... , w-1. The operator defined in Step 3 is modified as, T[a,b:c] : x → (x + a) c + b mod w 18) and its inverse operator is expressed as,
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 48 T[a,b;c] -1 : y → (y – b) c' – a mod w 19) where cc' = 1 mod ϕ(w) (ϕ(w): Euler's totient function). 3. HARDNESS OF DECRYPTION FOR ATTACKERS Attackers who have had the public information of sender and recipient are to solve the following system of two Diophantine equations; f(x1, x2, ... , xm) = 0 ... in Step 1 20) h(x1, x2, ... , xm) = p ... in Step 5 21) and estimate the secret s = g(x1, x2, ... , xm) with the obtained solution. As mentioned in earlier section, it is difficult to solve (20) and (21) in integers when m is greater than two in general. As another strategy, attackers may consider to decipher the sequence of operators appeared in Step 3; T[a1,b1:c1] T[a2,b2:c2] ... T[an,bn:cn] (g(x1, x2, ... , xm)) = h(x1, x2, ... , xm) 22) by using (20) and (21). Once the above sequence has been deciphered, attackers can estimate the secret s = g(x1, x2, ... , xm) applying the inverse sequence of the above sequence. However the highest order among x1, x2, ... , xm in h(x1, x2, ... , xm) becomes greater in general along with the increase of the iteration number n expressed in (22). Since the greater the highest order is, the more equivalent expressions in the quotient ring Z[X1, X2, ... , Xm] / (f(X1, X2, ... , Xm)) are, it is also virtually impossible to decipher the sequence of operators (22) unless attackers have known the iteration number n previously or the Diophantine equation (12) is linear. When the system of higher order congruence equations are used for the scheme instead of Diophantine equations (20) and (21) as mentioned in earlier section, the size of secret key is generally determined by that of modulus w. Although the solution space for the system of congruence equations is finite, obtaining the secret s is still difficult for attackers because in general the problem to solve such system of higher order congruence equations is NP-complete when m > 2.[4] 4. PRO AND CON Attackers must solve the system of Diophantine equations to estimate the shared secret between sender and recipient. Generally it is hard to solve that system when it is positive- dimensional. Attackers also subject the similar constraint on the corresponding higher order congruence equation system. That feature brings the proven security which does not depend on the performance of attackers' computational capacity. Namely sender and recipient can choose the public keys which have the length shorter than that of public keys used for other cryptosystems without harming the security, and the shorter length of public keys would alleviate the computational load considerably.
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 49 Comparing with other key exchange cryptosystem such as RSA or Diffie-Hellman scheme, this cryptosystem needs additional key exchange step, that is, recipient must tell a Diophantine equation from which the quotient ring is constructed to sender prior to key exchange between them. It may increase the vulnerability regarding the security on this key exchange cryptosystem. Sender and recipient exchange Diophantine equations as their public keys. Although sender and recipient can choose their Diophantine equations arbitrary, some specific considerations are required to construct those Diophantine equations practically in the actual key exchange scheme as discussed below. Firstly in Step 1 described in the section: Key exchange scheme, the Diophantine equation (12) must be constructed carefully to avoid the case that it has unique solution, otherwise as soon as solving that equation, attackers get the secret keys expressed in (11). Next in Step 3, the Diophantine equation (14) must not have unique solution as well as (12), also it must be complicated enough to prevent from inferring the sequence of operators used for constructing (14) by attackers. It is not practical that the above Diophantine equations are constructed manually by sender and recipient in general cases, and it will be necessary to implement appropriate programs into that cryptosystem to generate those equations automatically based on the values of variables x1, x2, ... , xm set in Step 1, and aj, bj, cj and n set in Step 3. To prevent from breaking the patterns of generating them by attackers, the forms of Diophantine equations determined by those programs must not be static, but dynamically change according with the input, or randomly. Thus the implementation of this cryptosystem will impose additional calculation load for them with that for dealing with the Diophantine equations symbolically. 5. SUMMARY In the proposed key exchange cryptosystem the system of two higher order Diophantine equations is considered for encrypting shared secret between sender and recipient. The first Diophantine equation is created by recipient and sender creates another Diophantine equation on the quotient ring based on the first Diophantine equation. The shared secret has the form of polynomial and both sender and recipient can obtain its value by a trapdoor without solving the system of those Diophantine equations explicitly. On the other hand, attackers must solve the following system of two Diophantine equations mentioned above in order to obtain the secret. f(x1, x2, ... , xm) = 0 23) h(x1, x2, ... , xm) = p 24) In general it is hard to solve the above system in integers for x1, x2, ... , xm when m is greater than two. Although this key exchange cryptosystem has the intrinsic security mentioned above, it requires rather complicated implementation comparing with other key exchange cryptosystems.
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 50 This complexity is due to generate Diophantine equations used as public keys with unpredictable manner lest attackers detect the pattern of their generations. The specifically designed program must be implemented in the cryptosystem for that purpose. REFERENCES [1] W. Diffie and M. E. Hellman, New Directions in Cryptography. IEEE Transactions on Information Theory, vol. IT-22, pp. 644-654, Nov. 1976. [2] D. Knuth, The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Third Edition. Addison-Wesley, 1997. [3] M. Sipser, Introduction to the Theory of Computation. PWS Publishing, pp. 374-376, 1997. [4] M. R. Garey, D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP- Completeness. W. H. Freeman, 1979. [5] B. Buchberger, An algorithmic criterion for the solvability of algebraic systems of equations. Aequationes Math., 4, pp. 374-383, 1965. [6] Yu. I. Manin, Hilbert's tenth problem. J. Soviet Math., 3 : 1, pp. 164-184, 1975. [7] H. Cohen, Number Theory, Vol. I: Tools and Diophantine Equations and Vol. II: Analytic and Modern Tools. Springer-Verlag, GTM 239, 240, 2007. [8] Y. V. Matiyasevich, Hilbert’s Tenth Problem. MIT press, 1993. [9] C. S. Laih, et al, Cryptanalysis of Diophantine equation oriented public key cryptosystem. IEEE Transactions on Computers, Vol 46, April, 1997. [10] H. Ong, C. Schnorr, A. Shamir, An efficient signature scheme based on polynomial equations. Proc. of CRYPTO, pp 37–46, 1985. [11] C. H. Lin, C. C. Chang, R. C. T. Lee, A New Public-Key Cipher System Based Upon the Diophantine Equations. IEEE Transactions on Computers, Volume 44, Issue 1, 1995. [12] G. Luger, Artificial Intelligence: Structures and Strategies for Complex Problem solving. 4e Pearson Education, 2006. [13] S. Abraham, and M. Sanglikar, A* Search for a Challenging Problem. Proceedings of the 3rd International Conference on Mathematics and Computer Science held at Loyola College, Chennai, 5th- 6th January 2009. [14] Z. Michalewich, GA + Data Structures = Evaluation Programs. Springer Verlag, 1992 Author Harry Yosh is a knowledge manager at HECO Ltd. He is also a data analyst at APA Group, Canberra, having graduated from University of Canberra with a Master of IT. His hobbies are traveling and swimming. Paper: Harry Yosh, General Addition Formula for Meromorphic Functions Derived from Residue Theorem. Journal of Mathematical Physics, Analysis, Geometry, v. 6, No 2, p. 183-191, 2010. (http://jmage.ilt.kharkov.ua/abstract.php?uid=jm06-0183e)