Security and Speed Improvement of GGH based on polynomial rings, quaternion algebra and Gaussian method

Publish Year: 1392
نوع سند: مقاله کنفرانسی
زبان: English
View: 1,282

This Paper With 8 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

NCNIEE02_284

تاریخ نمایه سازی: 29 بهمن 1392

Abstract:

We propose a probabilistic and multi-dimensional public key cryptosystem based on the GGH public key cryptosystem using polynomial rings and quaternion algebra.The new method encrypts four data vectors in each encryption session using quaternion algebraic structure and polynomialrings. The new method is faster than GGH in producing publickey but it is slow in encryption and decryption since it uses quaternion algebraic structure and polynomial rings. The newmethod strengths the GGH cryptosystem while using quaternion algebraic structure. Quaternion algebra is a non-commutativealgebra and it makes this cipher much more resistant to some lattice based attacks. For key generation in Quaternion GGHwe need sixteen multiplications which makes its calculationsslow. By using Gaussian and Brent equations we reduce the number of multiplications into twelve . For this reason we willuse Multiplicative Complexity for optimizing algebraic computations in non-commutative rings. As a result, the efficiency of Quaternion GGH has been increased and calculated in less time

Authors

Massoud Sokouti

Faculty of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran,

Ali Zakerolhosseini

Faculty of Electrical and Computer Engineering, Shahid Beheshti University, Tehran, Iran,

Babak Sokouti

Biotechnology Research Center Tabriz University of Medical Sciences, Tabriz, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • p. 153- , 1975 ..dع [7] I. N. Herstein, Topics ...
  • S. D. Galbrith, Mathematic of Public Key Cryptography, New ...
  • _ _ , _ "Public-key Cryptosystems from Lattice Reduction Problems", ...
  • P. Nguyen, "Cryptanalysis of the goldreich -goldwas ser-halevi ...
  • D. Micciancio. "Lattice based cryptography: A global improvement.", Theory of ...
  • D. Micciancio. "Improving lattice based cryptosystems using the Hermite normal ...
  • F. M. Hall, An Introduction to Abstract Algebra, Cambridge University ...
  • T. Y. Lam, A First Course in Noncom mutative Rings, ...
  • _ Texts _ ed., New York: S pringer-Verlag, 2002. ...
  • J. H. Conway and D. A. Smith. On Quaternions and ...
  • J. C. Baez. The octonion, Bulletin of the American Mathematicat ...
  • _ algebras _ thesis, Waterloo University, Ontario, Canada, 2008. ...
  • _ Strassen, "Gaussian elimination is not optimal, Numerische Mathematik, Vol ...
  • R. Brent, Algorithms for matrix multiplication, Tech. Report, Report TR-CS-70-157. ...
  • N. T. Courtois, D. Hulme and T Mourouzis, "Multiplicative Complexity ...
  • نمایش کامل مراجع