Efficiency of public key cryptosystems as block ciphers

被引:0
|
作者
Hassoun, Youssef [1 ]
Owayjan, Michel [1 ]
Counsell, Steve [2 ]
机构
[1] Amer Univ Sci & Technol, Beirut, Lebanon
[2] Brunel Univ London, Uxbridge, Middx, England
关键词
Public key cryptosystems; Block ciphers; RSA; EIGamal; Chebyshev polynomials; SECURITY;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As block ciphers, public key cryptosystems operate on groups of plaintext characters, called blocks. Character grouping enhances efficiency and security. However, the encryption functions, which are one-way trapdoor functions defined over finite fields, restrict the sizes of the blocks. In this paper, implementations of conventional RSA and EIGamal cryptosysterns together with implementations using Chebyshev polynomials are considered. In one case, in EIGamal cryptosystem using Chebyshev polynomials, we provide an implementation where, without compromising security, restriction on blocks is lifted. An empirical study compares the efficiencies of the different implementations, and, in particular, investigates the impact of dropping block size restriction on the performance of the EIGamal cryptosystems.
引用
收藏
页码:138 / 143
页数:6
相关论文
共 50 条
  • [41] FPGA based unified architecture for public key and private key cryptosystems
    Wang, Yi
    Li, Renfa
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (03) : 307 - 316
  • [42] Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
    Thomas Scanlon
    Journal of Cryptology, 2001, 14 : 225 - 230
  • [43] FPGA based unified architecture for public key and private key cryptosystems
    Yi Wang
    Renfa Li
    Frontiers of Computer Science, 2013, 7 : 307 - 316
  • [44] Public key cryptosystems based on drinfeld modules are insecure
    Scanlon, T
    JOURNAL OF CRYPTOLOGY, 2001, 14 (04) : 225 - 230
  • [45] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [46] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [47] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [48] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 1 - +
  • [49] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [50] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275