An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA
Abstract
:1. Introduction
2. Preliminaries
2.1. The General Public Key Cryptography Algorithm Can Be Described as Follows [1]
- Each user generates a key pair , where represents the private key and represents the public key. The public key cryptography algorithm requires that can be derived theoretically from , but in practice, it is not feasible due to the large computational complexity.
- The information sender encrypts the plaintext p using the publicly available key of the information receiver: , where represents the plaintext and represents the encrypted ciphertext.
- The information receiver decrypts using their privately held secret key : .
2.2. Chebyshev Polynomials and Their Properties
- •
- First,
- •
- Second, define the mapping on , then the following semi-group property holds:
2.3. Rivest–Shamir–Adleman
- Select two random large primes and , each with at least 512 bits, ensuring that the difference between them is not too large or too small;
- Calculate the modulus and the Euler’s totient function value ;
- Select a number and use the extended Euclidean algorithm to find that satisfies ;
- The information receiver publishes the public key , with as the private key;
- The information sender divides the plaintext into blocks, such that each block is a positive integer less than , and encrypts it using ;
- The information receiver decrypts using the privately saved key according to the equation .
2.4. Chebyshev-RSA Public Key Cryptosystem
- Key generation. Bob randomly generates two different large prime numbers and , calculates and , chooses a random number such that and , and calculates the integer such that and ; Bob’s public key is and the private key is ;
- Message encryption. Alice converts the message to be encrypted into an integer , calculates the ciphertext based on Bob’s public key , and sends it to Bob;
- Message decryption. Bob receives the ciphertext and uses the private key to obtain the plaintext .
3. Improved Public Key Encryption Algorithm
3.1. Key Generation
- Alice randomly generates two distinct large prime numbers and , with similar sizes, but is a large integer;
- Calculate and ;
- Randomly select an integer , choose a random number such that and ;
- Use the extended Euclidean algorithm to calculate , such that and , and calculate ;
3.2. Encryption
- Bob obtains Alice’s public key ;
- Randomly choose , calculate , and select based on Equation (6);
- Express the message to be encrypted as an integer , calculate , and satisfy ;
- Use the public key to calculate , and . , where is a mature symmetric encryption system;
- Send the ciphertext to Alice.
3.3. Decryption
- Alice receives the ciphertext , decrypts , and checks . If it is correct, continue; otherwise, stop;
- Calculate using the private key , , and select based on Equation (7);
- Calculate .
4. Algorithm Implementation
4.1. Feasibility Analysis
4.2. An Example
4.2.1. Generation of Secret Key
- Alice randomly generates two distinct large prime numbers, and ;
- Compute and ;
- Select a random integer and a random number , where ;
- Use the extended Euclidean algorithm to calculate , satisfying , and . Calculate the Chebyshev polynomial ;
4.2.2. Encryption
- Bob obtains Alice’s public key ;
- Choose a random and calculate . Select according to Equation (7). For simplicity, take and as an arithmetic progression. In this case, calculate Equation (11) and select .
- 3.
- Express the message to be encrypted as an integer and calculate , satisfying ;
- 4.
- Compute the ciphertext ;
- 5.
- .
4.2.3. Decryption
- Alice receives the ciphertext ;
- Calculate using the private key . At this point, . Similarly, calculate Equation (12) and select ;
- Calculate .
4.3. Mathematical Proof of The Proposed Algorithm
5. Implementation Results and Analysis
- Attackers cannot use the periodicity of Chebyshev polynomials to break it, because the cosine representation of Chebyshev polynomials defined on the interval is not valid.
- The three typical scenarios of RSA cipher attacks cannot be the same as the proposed scheme, because the following inequalities hold:
- It can resist common modular attacks.
- After encryption transformation, the linear independence between plaintexts cannot be maintained, which is immune to low exponent attacks.
5.1. Performance Analysis
5.1.1. Key Generation
5.1.2. Encryption and Decryption
5.2. Security Analysis
5.2.1. Security Resistance to Man-in-the-Middle Attack Which Is Described Above
5.2.2. Security against Tampering Attacks and Identity Authentication
5.2.3. Practicability Analysis
5.2.4. Comparison between Improved Algorithm and Original Algorithm
6. Conclusions and Future Scope
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Zhao, G.; Ma, Y. Introduction to chaotic cryptographic algorithms. In Chaotic Applied Cryptography, 1st ed.; Cheng, J., Ed.; Science Press: Beijing, China, 2021; pp. 1–7. [Google Scholar]
- Diffie, W.; Hellman, M.E. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644–654. [Google Scholar] [CrossRef]
- Rivest, R.L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 1978, 21, 120–126. [Google Scholar] [CrossRef]
- Arora, S. Enhancing cryptographic security using novel approach based on enhanced-RSA and Elamal: Analysis and comparison. Int. J. Comput. Appl. 2015, 975, 8887. [Google Scholar]
- Luo, C.; Fei, Y.; Kaeli, D. Side-channel timing attack of RSA on a GPU. ACM Trans. Archit. Code Optim. (TACO) 2019, 16, 1–18. [Google Scholar] [CrossRef]
- Zheng, M. Generalized implicit-key attacks on RSA. J. Inf. Secur. Appl. 2023, 77, 103562. [Google Scholar] [CrossRef]
- Zhang, P. Quantum Related-Key Attack Based on Simon’s Algorithm and Its Applications. Symmetry 2023, 15, 972. [Google Scholar] [CrossRef]
- Nitaj, A.; Susilo, W.; Tonien, J. A new attack on some RSA variants. Theor. Comput. Sci. 2023, 960, 113898. [Google Scholar] [CrossRef]
- Imam, R.; Areeb, Q.M.; Alturki, A.; Anwer, F. Systematic and critical review of rsa based public key cryptographic schemes: Past and present status. IEEE Access 2021, 9, 155949–155976. [Google Scholar] [CrossRef]
- El Makkaoui, K.; Beni-Hssane, A.; Ezzati, A.; El-Ansari, A. Fast cloud-RSA scheme for promoting data confidentiality in the cloud computing. Procedia Comput. Sci. 2017, 113, 33–40. [Google Scholar] [CrossRef]
- Moghaddam, F.F.; Alrashdan, M.T.; Karimi, O. A hybrid encryption algorithm based on RSA small-e and efficient-RSA for cloud computing environments. J. Adv. Comput. Netw. 2013, 1, 238–241. [Google Scholar] [CrossRef]
- AlSabti, K.D.M.; Hashim, H.R. A new approach for image encryption in the modified RSA cryptosystem using MATLAB. Glob. J. Pure Appl. Math. 2016, 12, 3631–3640. [Google Scholar]
- Jagadiswary, D.; Saraswady, D. Estimation of modified RSA cryptosystem with hyper image encryption algorithm. Indian J. Sci. Technol. 2017, 10, 1–5. [Google Scholar] [CrossRef]
- Mustafa, I.; Khan, I.U.; Aslam, S.; Sajid, A.; Mohsin, S.M.; Awais, M.; Qureshi, M.B. A lightweight post-quantum lattice-based RSA for secure communications. IEEE Access 2020, 8, 99273–99285. [Google Scholar] [CrossRef]
- Rawat, A.S.; Deshmukh, M. Computation and communication efficient secure group key exchange protocol for low configuration system. Int. J. Inf. Technol. 2021, 13, 839–843. [Google Scholar] [CrossRef]
- Chait, K.; Laouid, A.; Kara, M.; Hammoudeh, M.; Aldabbas, O.; Al-Essa, A.T. An Enhanced RSA-Based Aggregate Signature Scheme to Reduce Blockchain Size. IEEE Access 2023, 11, 110490–110501. [Google Scholar] [CrossRef]
- Imam, R.; Anwer, F.; Nadeem, M. An Effective and enhanced RSA based Public Key Encryption Scheme (XRSA). Int. J. Inf. Technol. 2022, 14, 2645–2656. [Google Scholar] [CrossRef]
- Minni, R.; Sultania, K.; Mishra, S.; Vincent, D.R. An algorithm to enhance security in RSA. In Proceedings of the 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode, India, 4–6 July 2013; pp. 1–4. [Google Scholar]
- Thangavel, M.; Varalakshmi, P.; Murrali, M.; Nithya, K. An enhanced and secured RSA key generation scheme (ESRKGS). J. Inf. Secur. Appl. 2015, 20, 3–10. [Google Scholar] [CrossRef]
- Lüy, E.; Karatas, Z.Y.; Ergin, H. Comment on “An enhanced and secured RSA key generation scheme (ESRKGS)”. J. Inf. Secur. Appl. 2016, 30, 1–2. [Google Scholar] [CrossRef]
- Mathur, S.; Gupta, D.; Goar, V.; Kuri, M. Analysis and design of enhanced RSA algorithm to improve the security. In Proceedings of the 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT), Ghaziabad, India, 9–10 February 2017; pp. 1–5. [Google Scholar]
- Akhter, S.; Chowdhury, M.B. Bangla and English text cryptography based on modified blowfish and Lempel-Ziv-Welch algorithm to minimize execution time. In Proceedings of the 2019 International Conference on Robotics, Electrical and Signal Processing Techniques (ICREST), Dhaka, Bangladesh, 10–12 January 2019; pp. 96–101. [Google Scholar]
- Panda, P.K.; Chattopadhyay, S. A hybrid security algorithm for RSA cryptosystem. In Proceedings of the 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), Coimbatore, India, 6–7 January 2017; pp. 1–6. [Google Scholar]
- Agrawal, S.; Patel, M.; Sinhal, A. An enhance security of the color image using asymmetric RSA algorithm. In Proceedings of the International Conference on Communication and Computational Technologies: ICCCT-2019; Springer: Singapore, 2020; pp. 279–286. [Google Scholar]
- Shannon, C.E. Communication theory of secrecy systems. Bell Syst. Tech. J. 1949, 28, 656–715. [Google Scholar] [CrossRef]
- Mohamed, K.S. New Frontiers in Cryptography: Quantum, Blockchain, Lightweight, Chaotic and DNA, 1st ed.; Springer Nature: Cham, Switzerland, 2020; pp. 13–28. [Google Scholar]
- Kocarev, L.; Tasev, Z. Public-key encryption based on Chebyshev maps. In Proceedings of the 2003 International Symposium on Circuits and Systems, 2003. ISCAS’03, Bangkok, Thailand, 25–28 May 2003; p. III. [Google Scholar] [CrossRef]
- Bergamo, P.; D’Arco, P.; De Santis, A.; Kocarev, L. Security of public-key cryptosystems based on Chebyshev polynomials. IEEE Trans. Circuits Syst. I Regul. Pap. 2005, 52, 1382–1393. [Google Scholar] [CrossRef]
- Zhao, G.; Sun, J.; Zhao, F. Key Agreement Scheme Based on Chebyshev Polynomial over finite field. Appl. Res. Comput. 2012, 29, 3794–3796. [Google Scholar]
- Wang, D.; Hu, Z.; Tong, Z.; Zha, X. An identity authentication system based on Chebyshev polynomials. In Proceedings of the 2009 First International Conference on Information Science and Engineering, Nanjing, China, 26–28 December 2009; pp. 1648–1650. [Google Scholar]
- Muhammad, A.S.; Özkaynak, F. SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs. Symmetry 2021, 13, 824. [Google Scholar] [CrossRef]
- Dai, W.; Xu, X.; Song, X.; Li, G. Audio Encryption Algorithm Based on Chen Memristor Chaotic System. Symmetry 2022, 14, 17. [Google Scholar] [CrossRef]
- Lu, Q.; Yu, L.; Zhu, C. Symmetric Image Encryption Algorithm Based on a New Product Trigonometric Chaotic Map. Symmetry 2022, 14, 373. [Google Scholar] [CrossRef]
- Alsaif, H.; Guesmi, R.; Kalghoum, A.; Alshammari, B.M.; Guesmi, T. A Novel Strong S-Box Design Using Quantum Crossover and Chaotic Boolean Functions for Symmetric Cryptosystems. Symmetry 2023, 15, 833. [Google Scholar] [CrossRef]
- Hsiao, F.H. Chaotic synchronization cryptosystems combined with RSA encryption algorithm. Fuzzy Sets Syst. 2018, 342, 109–137. [Google Scholar] [CrossRef]
- Ruzai, W.N.A.; Abd Ghafar, A.H.; Salim, N.R.; Ariffin, M.R.K. On (Unknowingly) Using Near-Square RSA Primes. Symmetry 2022, 14, 1898. [Google Scholar] [CrossRef]
- Lawnik, M.; Kapczyński, A. Application of modified Chebyshev polynomials in asymmetric cryptography. Comput. Sci. 2019, 20, 289–303. [Google Scholar] [CrossRef]
- Gupta, M.; Gupta, K.K.; Shukla, P.K. Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover. Multimed. Tools Appl. 2021, 80, 33843–33863. [Google Scholar] [CrossRef]
- Patgiri, R.; Singh, L.D. An Analysis on the Variants of the RSA Cryptography. In Proceedings of the 2022 International Conference on Information Networking (ICOIN), Jeju-si, Republic of Korea, 12–15 January 2022; pp. 40–45. [Google Scholar]
- Ryu, J.; Kang, D.; Won, D. Improved secure and efficient Chebyshev chaotic map-based user authentication scheme. IEEE Access 2022, 10, 15891–15910. [Google Scholar] [CrossRef]
- Kocarev, L.; Makraduli, J.; Amato, P. Public-key encryption based on Chebyshev polynomials. Circuits Syst. Signal Process. 2005, 24, 497–517. [Google Scholar] [CrossRef]
- Islam, M.A.; Islam, M.A.; Islam, N.; Shabnam, B. A modified and secured RSA public key cryptosystem based on “n” prime numbers. J. Comput. Commun. 2018, 6, 78. [Google Scholar] [CrossRef]
Algorithm Model | Total Modulus | Intermediate Variables as of Standard RSA | Encryption Scheme | Key Generation | Decryption Scheme | Shortcomings/Comments |
---|---|---|---|---|---|---|
Rivest, R.L. et al. [3] | Not Any | Security is not efficient | ||||
Minni et al. [18] | Higher time Complexity [19] | |||||
Thangavel et al. [19] | Same security level as RSA [20] | |||||
Mathur et al. [21] | Slower, i.e., higher time [22] | |||||
Panda and Chattopadhyay [23] | Security is not efficient [24] | |||||
Raza Imam et al. [17] | Lack of proof |
Model | Length of Primes (in bits) | Key Generation Time (in ms) | Encryption Time (in ms) | Decryption Time (in ms) | Total Execution Time (in ms) |
---|---|---|---|---|---|
RSA | 64 | 20.27 | 0.26 | 0.22 | 20.75 |
128 | 25.47 | 0.37 | 0.33 | 26.17 | |
256 | 40.50 | 0.97 | 0.85 | 42.32 | |
512 | 76.55 | 1.75 | 1.68 | 79.99 | |
1024 | 820.14 | 15.28 | 14.54 | 849.96 | |
2048 | 4575.03 | 52.26 | 37.39 | 4664.67 | |
XRSA | 64 | 32.00 | 0.57 | 0.54 | 33.11 |
128 | 47.61 | 1.30 | 1.05 | 49.95 | |
256 | 93.54 | 2.02 | 2.01 | 97.56 | |
512 | 188.91 | 10.53 | 9.56 | 209.00 | |
1024 | 922.81 | 39.68 | 36.06 | 998.56 | |
2048 | 8706.22 | 185.98 | 221.41 | 9113.61 | |
CRPKC | 64 | 50.03 | 0.96 | 0.94 | 51.93 |
128 | 76.33 | 1.46 | 1.42 | 79.21 | |
256 | 147.21 | 4.61 | 3.77 | 155.59 | |
512 | 228.62 | 11.81 | 12.14 | 252.57 | |
1024 | 1582.39 | 40.12 | 39.25 | 1661.76 | |
2048 | 14,203.75 | 198.01 | 232.38 | 14,634.14 | |
CRPKC-Ki | 64 | 35.02 | 0.65 | 0.64 | 36.32 |
128 | 54.19 | 1.29 | 1.08 | 56.57 | |
256 | 105.99 | 3.12 | 3.09 | 112.19 | |
512 | 177.18 | 10.93 | 10.01 | 198.12 | |
1024 | 1250.09 | 39.87 | 39.24 | 1329.19 | |
2048 | 10,036.74 | 1896.98 | 235.31 | 12,169.03 |
Attacks/Functions | The Algorithm, CRPKC | |
---|---|---|
Man-in-the-middle attack | Not safe | Safe |
Tampering attack | Not safe | Safe |
Authentication | Not given | Safe |
Practicability | Ordinary | Better |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Zhang, C.; Liang, Y.; Tavares, A.; Wang, L.; Gomes, T.; Pinto, S. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA. Symmetry 2024, 16, 263. https://doi.org/10.3390/sym16030263
Zhang C, Liang Y, Tavares A, Wang L, Gomes T, Pinto S. An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA. Symmetry. 2024; 16(3):263. https://doi.org/10.3390/sym16030263
Chicago/Turabian StyleZhang, Chunfu, Yanchun Liang, Adriano Tavares, Lidong Wang, Tiago Gomes, and Sandro Pinto. 2024. "An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA" Symmetry 16, no. 3: 263. https://doi.org/10.3390/sym16030263
APA StyleZhang, C., Liang, Y., Tavares, A., Wang, L., Gomes, T., & Pinto, S. (2024). An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA. Symmetry, 16(3), 263. https://doi.org/10.3390/sym16030263