Two RSA-based Cryptosystems
- URL: http://arxiv.org/abs/2405.11041v1
- Date: Fri, 17 May 2024 18:35:29 GMT
- Title: Two RSA-based Cryptosystems
- Authors: A. Telveenus,
- Abstract summary: The cryptosystem RSA is a very popular cryptosystem in the study of Cryptography.
In this article, we explore how the idea of a primitive mth root of unity in a ring can be integrated into the Discrete Fourier Transform.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The cryptosystem RSA is a very popular cryptosystem in the study of Cryptography. In this article, we explore how the idea of a primitive mth root of unity in a ring can be integrated into the Discrete Fourier Transform, leading to the development of new cryptosystems known as RSA-DFT and RSA-HGR.
Related papers
- An RSA Cryptosystem over a Halidon Group Ring of a Dihedral Group [0.0]
The article explores the creation of a cryptosystem using a halidon group ring of a dihedral group.
The logic used to develop a decryption programme was also quite complex.
arXiv Detail & Related papers (2024-10-28T10:44:16Z) - Revocable Encryption, Programs, and More: The Case of Multi-Copy Security [48.53070281993869]
We show the feasibility of revocable primitives, such as revocable encryption and revocable programs.
This suggests that the stronger notion of multi-copy security is within reach in unclonable cryptography.
arXiv Detail & Related papers (2024-10-17T02:37:40Z) - Lightweight Public Key Encryption in Post-Quantum Computing Era [0.0]
Confidentiality in our digital world is based on the security of cryptographic algorithms.
In the course of technological progress with quantum computers, the protective function of common encryption algorithms is threatened.
Our concept describes the transformation of a classical asymmetric encryption method to a modern complexity class.
arXiv Detail & Related papers (2023-11-24T21:06:42Z) - A tiny public key scheme based on Niederreiter Cryptosystem [1.1633929083694385]
This article proposes a code-based public key cryptography scheme that is both simple and implementable.
The key length for the primary parameters of the McEliece cryptosystem ranges from 18 to 500 bits.
The security of this system is at least as strong as the security of the Niederreiter cryptosystem.
arXiv Detail & Related papers (2023-10-10T15:50:18Z) - Demystifying the RSA Algorithm: An Intuitive Introduction for Novices in Cybersecurity [0.0]
The RSA algorithm is a crucial component in public-key cryptosystems.
understanding the RSA algorithm typically entails familiarity with number theory, modular arithmetic, and related concepts.
We present an intuitively crafted, student-oriented introduction to the RSA algorithm.
arXiv Detail & Related papers (2023-08-05T04:20:18Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - RSA+: An RSA variant [0.0]
We introduce a new probabilistic public-key cryptosystem which combines the main ingredients of the well-known RSA and Rabin cryptosystems.
We investigate the security and performance of our new scheme in comparison to the other two.
arXiv Detail & Related papers (2022-12-31T02:48:17Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Recovering AES Keys with a Deep Cold Boot Attack [91.22679787578438]
Cold boot attacks inspect the corrupted random access memory soon after the power has been shut down.
In this work, we combine a novel cryptographic variant of a deep error correcting code technique with a modified SAT solver scheme to apply the attack on AES keys.
Our results show that our methods outperform the state of the art attack methods by a very large margin.
arXiv Detail & Related papers (2021-06-09T07:57:01Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.