CN110855436A - Structure of key system based on secondary surplus - Google Patents
Structure of key system based on secondary surplus Download PDFInfo
- Publication number
- CN110855436A CN110855436A CN201911117914.5A CN201911117914A CN110855436A CN 110855436 A CN110855436 A CN 110855436A CN 201911117914 A CN201911117914 A CN 201911117914A CN 110855436 A CN110855436 A CN 110855436A
- Authority
- CN
- China
- Prior art keywords
- bob
- sequence
- ciphertext
- plaintext
- mod
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
Abstract
The invention relates to a structure of a key system based on secondary residue; in order to avoid the problem that a deterministic public key cryptosystem is easy to be attacked by selecting plaintext, the invention introduces random numbers on the basis of the difficulty of large number factorization and the difficulty of square root solving by quadratic residue of a modular Blum number, and constructs a polynomial encryption key system on the basis of quadratic residue. The cipher strength of the cipher system is not lower than that of RSA public key cipher system, and this can resist attack from selected plaintext and has high safety. The expansion rate of the ciphertext is not higher than that of the BG cryptosystem proposed by Blum and Goldwasser, and when the plaintext to be transmitted is longer, the expansion rate of the ciphertext is approximate to 1.
Description
Technical Field
The invention relates to the field of cryptography, in particular to a structure of a key system based on secondary residue.
Background
With the advent of the cloud era, many people upload their own important information to an internet server, and the security of internet communication and shared data is concerned. To ensure the security of data, it is the information encryption that is done first. There are many ways of encryption in cryptography, and the public key cryptosystem has an irreplaceable role due to its unique advantages. When we have chosen the encryption key, the correspondence between each plaintext and each ciphertext is bijective. However, when we encrypt plaintext, for the public key cryptosystem, the key of the encryption algorithm is usually published in advance. Therefore, it is generally difficult to withstand the attack of choosing plaintext with a certain public key cryptosystem. For the regret of the public key cryptosystem, Goldwasser and Micali put forward the concept of the probabilistic cryptosystem for the first time in 1984, but the expansion rate is too large, so that the probabilistic cryptosystem has no practical value.
Based on the thought of quadratic residue and probability encryption, the invention deeply studies the probability public key cipher and constructs a polynomial encryption key system based on quadratic residue. The newly constructed secondary residual key system can well resist the attack of selecting plaintext, and simultaneously, the expansion rate of the ciphertext of the secondary residual key system is lower than that of the BG cryptosystem proposed by Blum and Goldwasser, and the security of the cryptosystem is not lower than that of an RSA public key cryptosystem.
Disclosure of Invention
The invention aims to provide a structure of a key system based on secondary residue; has the advantages that: the cipher strength of the cipher system is not lower than that of RSA public key cipher system, and this can resist attack from selecting plain text effectively and has high safety. The expansion rate of the ciphertext is not higher than that of the BG cryptosystem proposed by Blum and Goldwasser, and when the plaintext to be transmitted is longer, the expansion rate of the ciphertext is approximate to 1.
The invention adopts the following technical scheme for realizing the purpose: the method comprises the following steps:
(1) encryption algorithm
1): at ZnThe n-th irreducible polynomial p (x) a0+a1x+a2x2+…+anxnThe plaintext M is (a)0,a1,…an),(a0,a1,…an) A sequence of coefficients that is an irreducible polynomial of degree n.
2): alice finds the encryption key N published in advance by Bob, and calculates as follows:
b1≡a1 2modN (2)
bn≡an 2modN (3)
to obtain the sequence B ═ B: (b0,b1,b2,…bn)
3): a random variable k is introduced and the random variable k,the following calculations were made:
x0≡k2modN (4)
x1≡x0 2modN (5)
xn+1≡xn 2modN (6)
to give the sequence D ═ (x)1,x2,x3…xn+1)
4): then calculate xn+2≡xn+1 2modN
5): calculating E ═ b0×x1,b1×x2,…bn×xn+1) Record c1=b0×x1,c2=b1×x2,…,cn+1=bn×xn+1
5): transmitting ciphertext C ═ C1,c2,…cn+1,xn+2) To Bob.
(2) Decryption algorithm
1): bob obtains the ciphertext C ═ C (C) sent by Alice1,c2,…cn+1,xn+2) Then, according to theorem 1.5, we calculate in turn:
to give the sequence D ═ (x)1,x2,x3…xn+1)
3): by the sequence B ═ B0,b1,b2,…bn) And theorem 1.5 can yield:
4): finally, the plaintext M ═ a is solved0,a1,…an) Bob therefore deciphers the ciphertext that Alice sent to him.
Preferably, in the structure of the key system based on the quadratic residue provided by the invention, Bob finds out two large prime numbers p and q (which cannot be disclosed) in the encryption algorithm in the step (1), so that p ≡ q ≡ 3mod4 needs to be calculated, and simultaneously Blum number N ≡ p · q needs to be calculated, and Bob discloses N as the encryption key in the encryption algorithm.
Preferably, in the structure of the key system based on the quadratic residue provided by the invention, in the decryption algorithm in the step (2), Bob takes p and q as decryption keys in the decryption algorithm.
Has the advantages that:
compared with the prior art, the invention has the beneficial effects that: the invention aims to provide a structure of a key system based on secondary residue; has the advantages that: the cipher strength of the cipher system is not lower than that of RSA public key cipher system, and this can resist attack from selected plain text effectively and has high safety. The expansion rate of the ciphertext is not higher than that of the BG cryptosystem proposed by Blum and Goldwasser, and when the plaintext to be transmitted is longer, the expansion rate of the ciphertext is approximate to 1.
Drawings
FIG. 1 is a flow chart of an encryption algorithm
FIG. 2 is a flowchart of a decryption algorithm
Detailed Description
(1) Encryption algorithm
1): at ZnThe n-th irreducible polynomial p (x) a0+a1x+a2x2+…+anxnThe plaintext M is (a)0,a1,…an),(a0,a1,…an) A sequence of coefficients that is an irreducible polynomial of degree n.
2): alice finds the encryption key N published in advance by Bob, and calculates as follows:
b0≡a0 2modN (1)
b1≡a1 2modN (2)
bn≡an 2modN (3)
to obtain the sequence B ═ (B)0,b1,b2,…bn)
3): a random variable k is introduced and the random variable k,the following calculations were made:
x0≡k2modN (4)
x1≡x0 2modN (5)
xn+1≡xn 2modN (6)
to give the sequence D ═ (x)1,x2,x3…xn+1)
4): then calculate xn+2≡xn+1 2modN
5): calculating E ═ b0×x1,b1×x2,…bn×xn+1) Record c1=b0×x1,c2=b1×x2,…,cn+1=bn×xn+1
5): transmitting ciphertext C ═ C1,c2,…cn+1,xn+2) To Bob.
(2) Decryption algorithm
1): bob obtains the ciphertext C ═ C (C) sent by Alice1,c2,…cn+1,xn+2) Then, according to theorem 1.5, we calculate in turn:
to give the sequence D ═ (x)1,x2,x3…xn+1)
3): by the sequence B ═ B0,b1,b2,…bn) The following can be obtained:
4): finally, the plaintext M ═ a is solved0,a1,…an) Bob therefore deciphers the ciphertext that Alice sent to him.
The effect analysis of the invention:
(1) security analysis
It is easy to see from the encryption and decryption processes that if an enemy intercepts and captures the ciphertext and the encryption key and wants to obtain the related information of the plaintext, the square root under the modulus N must be calculated, the problem is solved as the problem of decomposing the product of the large sum of numbers as prime numbers, and therefore the security of the encryption algorithm is equal to that of the RSA encryption algorithm. Meanwhile, a random number k is added in the encryption process, so that the ciphertext has randomness. Namely, the same encryption key is used for the same plaintext, and the ciphertexts obtained when different random numbers are selected for encryption are different, so that the attack of plaintext selection is effectively prevented. Therefore, the security of the probability public key cryptosystem based on quadratic residue polynomial encryption is not lower than that of the RSA cryptosystem.
(2) Expansion ratio of ciphertext
The ratio of the ciphertext length to the plaintext length after encryption is defined as the expansion ratio of the ciphertext. In the cryptosystem constructed herein, the plaintext M is (a)0,a1,…an) The sequence is encrypted as C ═ C1,c2,…cn+1,xn+2) Sequence, ciphertext having a dilation Rate ofIf Alice wants to transmit plaintext information particularly long, the expansion rate of the ciphertext can be seen as approximately 1. Generally, the cipher text expansion rate of the key system based on the quadratic residue structure is slightly larger than 1, but is lower than that of the BG cipher system proposed by Blum and Goldwasser.
(3) Encryption and decryption efficiency analysis
The time of the key system based on the secondary residual structure is mainly used for the computation of two square remainders, the decryption is used for the computation of two moduli, and the time complexity is slightly higher than that of a BG cryptosystem and is less than that of a public key cryptosystem O (k) such as RSA and the like3). Therefore, the encryption and decryption efficiency of the new probabilistic public key cryptosystem is high.
In summary, the construction method based on the secondary residual key system provided by the invention has higher security, and the ciphertext expansion rate reaches an ideal level.
Claims (3)
1. A structure based on a key system of quadratic residue is characterized in that: the method comprises the following steps:
(1) encryption algorithm
1): at ZnThe n-th irreducible polynomial p (x) a0+a1x+a2x2+…+anxnThe plaintext M is (a)0,a1,…an),(a0,a1,…an) A sequence of coefficients that is an irreducible polynomial of degree n.
2): alice finds the encryption key N published in advance by Bob, and calculates as follows:
b0≡a0 2mod N (1)
b1≡a1 2mod N (2)
bn≡an 2mod N (3)
to obtain the sequence B ═ (B)0,b1,b2,…bn)
3): a random variable k is introduced and the random variable k,the following calculations were made:
x0≡k2mod N (4)
x1≡x0 2mod N (5)
xn+1≡xn 2mod N (6)
to give the sequence D ═ (x)1,x2,x3…xn+1)
4): then calculate xn+2≡xn+1 2mod N
5): calculating E ═ b0×x1,b1×x2,…bn×xn+1) Record c1=b0×x1,c2=b1×x2,…,cn+1=bn×xn+1
5): transmitting ciphertext C ═ C1,c2,…cn+1,xn+2) To Bob.
(2) Decryption algorithm
1): bob obtains the ciphertext C ═ C (C) sent by Alice1,c2,…cn+1,xn+2) Then, according to theorem 1.5, we calculate in turn:
to give the sequence D ═ (x)1,x2,x3…xn+1)
3): by the sequence B ═ B0,b1,b2,…bn) And theorem 1.5 can yield:
4): finally, the plaintext M ═ a is solved0,a1,…an) Bob therefore deciphers the ciphertext that Alice sent to him.
2. The structure of a secondary residual-based key system according to claim 1, wherein: in the encryption algorithm of step (1), Bob finds out two large prime numbers p and q (which cannot be disclosed), so that p ≡ q ≡ 3mod4 needs to be calculated, and simultaneously, Blum number N ≡ p · q needs to be calculated, and Bob discloses N as an encryption key in the encryption algorithm.
3. The structure of a secondary residual-based key system according to claim 1, wherein: in the decryption algorithm in the step (2), Bob takes p and q as decryption keys in the decryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911117914.5A CN110855436A (en) | 2019-11-15 | 2019-11-15 | Structure of key system based on secondary surplus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911117914.5A CN110855436A (en) | 2019-11-15 | 2019-11-15 | Structure of key system based on secondary surplus |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110855436A true CN110855436A (en) | 2020-02-28 |
Family
ID=69600439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911117914.5A Pending CN110855436A (en) | 2019-11-15 | 2019-11-15 | Structure of key system based on secondary surplus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110855436A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8385541B2 (en) * | 2010-02-18 | 2013-02-26 | King Fahd University Of Petroleum And Minerals | Method of performing elliptic polynomial cryptography with elliptic polynomial hopping |
CN104184581A (en) * | 2014-08-07 | 2014-12-03 | 中国人民武装警察部队工程大学 | Method for encrypting public key in signed quadratic residue class group |
CN106341230A (en) * | 2015-07-08 | 2017-01-18 | 吴清山 | Unconditional security cryptosystem |
-
2019
- 2019-11-15 CN CN201911117914.5A patent/CN110855436A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8385541B2 (en) * | 2010-02-18 | 2013-02-26 | King Fahd University Of Petroleum And Minerals | Method of performing elliptic polynomial cryptography with elliptic polynomial hopping |
CN104184581A (en) * | 2014-08-07 | 2014-12-03 | 中国人民武装警察部队工程大学 | Method for encrypting public key in signed quadratic residue class group |
CN106341230A (en) * | 2015-07-08 | 2017-01-18 | 吴清山 | Unconditional security cryptosystem |
Non-Patent Citations (4)
Title |
---|
刘直良: "一种基于二次剩余的改进的RFID认证协议", 《电信科学》 * |
孙国栋等: "基于REESSE1+公钥密码体制的概率加密", 《计算机工程》 * |
曹军委等: "基于Java的RSA公钥密码算法的实现与探讨", 《软件导刊》 * |
王尚平等: "Blum-Goldwasser概率公钥密码体制的一种改进方案", 《西安电子科技大学学报》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110958112B (en) | Key generation method and system, encryption and decryption method, and encrypted communication system | |
KR102116877B1 (en) | New cryptographic systems using pairing with errors | |
WO2017041669A1 (en) | Password based key exchange from ring learning with er-rors | |
CN110545179A (en) | R-LWE-based NTRU encryption method and security proving method thereof | |
Ezhilmaran et al. | Key exchange protocol using decomposition problem in near-ring | |
CN110677243B (en) | Construction method of proxy re-signature scheme supporting heterogeneous public key system | |
CN107786327B (en) | Safe and reliable transmission method based on LDPC code | |
CN113132104A (en) | Active and safe ECDSA (electronic signature SA) digital signature two-party generation method | |
Yang et al. | Quantum public-key cryptosystems based on induced trapdoor one-way transformations | |
Minfeng et al. | Elliptic curve cryptosystem ElGamal encryption and transmission scheme | |
US20060251248A1 (en) | Public key cryptographic methods and systems with preprocessing | |
US20100150343A1 (en) | System and method for encrypting data based on cyclic groups | |
CN102064938B (en) | One is based on multivariate and probabilistic public key encryption method | |
JP4563037B2 (en) | ENCRYPTION APPARATUS, DECRYPTION APPARATUS, ENCRYPTION SYSTEM HAVING THEM, ENCRYPTION METHOD, AND DECRYPTION METHOD | |
US20080019508A1 (en) | Public key cryptographic methods and systems with rebalancing | |
Nalwaya et al. | A cryptographic approach based on integrating running key in feedback mode of elgamal system | |
CN110855436A (en) | Structure of key system based on secondary surplus | |
Wang et al. | Signature schemes based on two hard problems simultaneously | |
Mohamed et al. | Towards algebraic cryptanalysis of HFE challenge 2 | |
El-Yahyaoui et al. | A Like ELGAMAL Cryptosystem But Resistant To Post-Quantum Attacks | |
Yang et al. | An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption | |
CN111756539B (en) | Identification encryption and decryption method capable of being repeated and random | |
Irawadi | Discrete Logarithmic Improvement for ElGamal Cryptosystem Using Matrix Concepts | |
Tian et al. | Security analysis of a fuzzy identity-based encryption scheme | |
CN109150545B (en) | ECC-based (m, N) threshold group signature method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20200228 |