Abstract
Polynomials have been used in various security systems. We direct our attention to the polynomials that can be used in a Massey-Omura type cryptosystem. For the benefit of the reader we introduce the original Massey-Omura cryptosystem. We then introduce other classes of polynomials which satisfy the conditions required for this system to function. In particular, we focus on the classes of linearised and sub-linearised polynomials. These polynomials exhibit special compositional behaviour under certain conditions, allowing us to construct Massey-Omura type cryptosystems.
This work was partially supported by an Australian Research Council grant
Preview
Unable to display preview. Download preview PDF.
References
S.D. Cohen, Exceptional polynomials and the reducibility of substitution polynomials, L'Enseignement Math. 36 (1990), 53–65.
M. Giesbrecht, Factoring in skew-polynomial rings over finite fields, J. Symbolic Computation (to appear).
M. Henderson and R. Matthews, Composition behaviour of linearised and sub-linearised polynomials over a finite field, preprint.
N. Koblitz, A Course in Number Theory and Cryptography, Springer-Verlag, New York, Berlin, 1987.
R. Lidl, G.L. Mullen, and G. Turnwald, Dickson Polynomials, Pitman Monographs and Surveys in Pure and Appl. Math., vol. 65, Longman Scientific and Technical, Essex, England, 1993.
R. Lidl and H. Niederreiter, Finite Fields, Encyclopedia Math. Appl., vol. 20, Addison-Wesley, Reading, 1983, (now distributed by Cambridge University Press).
G.L. Mullen and T.P. Vaughan, Cycles of linear permutation over a finite field, Linear Algebra Appl. 108 (1988), 63–82.
W.B. Müller and R. Nöbauer, Some remarks on public-key cryptosystems, Studia Sci. Math. Hungar. 16 (1981), 71–76.
H. Niederreiter, Some new cryptosystems based on feedback shift register sequences, Math. J. Okayama Univ. 30 (1988), 121–149.
O. Ore, On a special class of polynomials, Trans. Amer. Math. Soc. 35 (1933), 559–584, Errata, ibid. 36, 275 (1934).
P.K.S. Wah and M.Z. Wang, Realization and Application of the Massey-Omura Lock, Proc. Internat. Zurich Seminar, March 6–8 1984, pp. 175–182.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Henderson, M. (1998). Applications of linearised and sub-linearised polynomials to information security. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053736
Download citation
DOI: https://doi.org/10.1007/BFb0053736
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive