Skip to main content
Log in

RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems

  • Original Paper
  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

In the work at hand we regard the public-key cryptosystems RSA, Dickson, LUC and Williams. The Dickson and LUC systems are, for parameter \(P=a=1\), identical, except for the fact that the LUC system reduces the degrees of the decryption functions by employing ciphertext-dependent decryption parameters. We show that also for the Dickson system with parameter \(a=-1\) the degrees of the decryption functions can be reduced. Furthermore, we emphasize on the implementability of the systems and apply for Dickson and LUC a seemingly rather unknown algorithm proposed by Montgomery to evaluate recurrences of the form \(X_{m+n}=f(X_m,X_n,X_{m-n})\). It turns out that this algorithm reduces the computational efforts of Dickson and LUC compared to commonly applied binary algorithms by about \(10\,\%\). For the Williams system we propose an algorithm which reduces its computational effort to almost one half compared to other proposed algorithms. Finally, we evaluate the computational efforts of the cryptosystems and show that the improvements proposed in this paper reduce the performance gaps between RSA and Dickson, LUC and Williams considerably.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Notes

  1. It is also possible to evaluate \(g_t(x,a)\) or \(V_t(x,a)\) for arbitrary parameters \(a\). In the following, however, we discuss the case where \(a=+1\).

  2. We note that also Montgomery mentioned this possibility briefly in his unpublished manuscript [16], however, not in relation with the Williams system.

References

  1. Aly, H., Müller, W.: Public-key cryptosystems based on Dickson polynomials. In: Proceedings of Pragocrypt, pp. 493–504 (1996)

  2. Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: Advances in Cryptology—Eurocrypt ’94, Lecture Notes in Computer Science, vol. 950, pp. 92–111. Springer (1994)

  3. Bernstein, D.: Pippenger’s Exponentiation Algorithm. http://cr.yp.to/papers/pippenger.pdf (2002). Accessed 16 Sept 2012

  4. Bleichenbacher, D., Joye, M., Quisquater, J.J.: A new and optimal chosen-message attack on RSA-type cryptosystems. In: Information and Communications Security, Lecture Notes in Computer Science, vol. 1334, pp. 302–313. Springer (1997)

  5. Boneh, D., Venkatesan, R.: Breaking RSA may not be equivalent to factoring. In: Advances in Cryptology, Eucrocrypt 98, Lecture Notes in Computer Science, vol. 1403, pp. 59–71. Springer (1998)

  6. Intel: Intel(R) 64 and IA-32 architectures optimization reference manual. Technical report, Intel Corporation (2011)

  7. Joye, M., Lenstra, A., Quisquater, J.J.: Protocol failures for RSA-like functions using lucas sequences and elliptic curves. In: Security Protocols, Lecture Notes in Computer Science, vol. 1189, pp. 93–100. Springer (1997)

  8. Katzenbeisser, S.: Recent Advances in RSA Cryptography. Springer, Berlin (2001)

    Book  MATH  Google Scholar 

  9. Knuth, D.: The Art of Computer Programming: Seminumerical Algorithms. Addison-Wesely, Reading (1998)

    MATH  Google Scholar 

  10. Koblitz, N.: A Course in Number Theory and Cryptography. Springer, Berlin (2006)

    Google Scholar 

  11. Koc, C., Acar, T.: Analyzing and comparing Montgomery multiplication algorithms. IEEE Micro. 16, 26–33 (1996)

    Article  Google Scholar 

  12. Lehmer, D.: Euclid’s algorithm for large numbers. Am. Math. Mon. 45(4), 7 (1938)

    Article  MathSciNet  Google Scholar 

  13. Lidl, R., Mullen, G., Turnwald, G.: Dickson Polynomials. Pitman Monographs and Surveys in Pure and Applied Mathematics, vol. 65. Longman Scientific & Technical, London (1993)

    Google Scholar 

  14. Lidl, R., Müller, W., Oswald, A.: Some remarks on strong Fibonacci pseudoprimes. Appl. Algebra Eng. Commun. Comput. 1, 59–65 (1990)

    Article  MATH  Google Scholar 

  15. Menezes, A., van Oorshot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (2001)

  16. Montgomery, P.: Evaluating Recurrences of the Form \(X_{m+n}=f(X_m, X_n, X_{m-n})\) via Lucas Chains. http://research.microsoft.com/en-us/um/people/petmon/Lucas.pdf (1983). Unpublished, Accessed 16 Sept 2012

  17. Montgomery, P.: Modular multiplication without trial division. Math. Comput. 44, 519–521 (1985)

    Article  MATH  Google Scholar 

  18. Müller, S.: On the security of a Williams based public key encryption scheme. In: Public Key Cryptography, Lecture Notes in Computer Science, vol. 1992, pp. 1–18. Springer (2001)

  19. Müller, W., Nöbauer, W.: Some remarks on public-key cryptosystems. Stud. Sci. Math. Hung. 16, 71–76 (1981)

    MATH  Google Scholar 

  20. Postl, H.: Fast evaluation of Dickson polynomials. In: Contributions to General Algebra 6, pp. 223–225. Verlag Hölder-Pichler-Tempsky, Vienna (1988)

  21. Quisquater, J.J., Couvreur, C.: Fast decipherment algorithm for RSA public-key cryptosystem. Electron. Lett. 18(21), 905–907 (1982)

    Google Scholar 

  22. Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)

    Google Scholar 

  23. Salomaa, A.: Public-Key Cryptography, 2nd edn. Springer, Berlin (1996)

    MATH  Google Scholar 

  24. Shallit, J., Sorenson, J.: A binary algorithm for the Jacobi symbol. ACM SIGSAM Bull. 27, 4–11 (1993)

    Article  Google Scholar 

  25. Smith., P., Lennon, M.: LUC: A new public key system. In: Proceedings of IFIP International Symposium on Computer Security, pp. 97–111 (1993)

  26. The GNU Multiple Precision Arithmetic Library. http://gmplib.org/. Accessed 16 Sept 2012

  27. Turnwald, G.: On Shur’s conjecture. J. Aust. Math. Soc. 58, 312–357 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  28. Welschenbach, M.: Kryptographie in C und C++. Springer, Berlin (2001)

  29. Williams, H.: Some public key crypto-functions as intractable as factorization. In: Proceedings of Crypto, pp. 66–70 (1984)

  30. Williams, H.: Édouard Lucas and Primality Testing. Wiley, London (1998)

    MATH  Google Scholar 

Download references

Acknowledgments

The author would like to thank W.B. Müller for many helpful suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Günther Brandner.

Appendix

Appendix

See Table 9.

Table 9 Rules for finding the Lucas chain for \(t\) and evaluating \(V_t(x,1)\) or \(g_t(x,1)\) (\(f(a,b,c)=ab-c\)) [16]

Rights and permissions

Reprints and permissions

About this article

Cite this article

Brandner, G. RSA, Dickson, LUC and Williams: a study on four polynomial-type public-key cryptosystems. AAECC 24, 17–36 (2013). https://doi.org/10.1007/s00200-012-0181-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00200-012-0181-9

Keywords

Mathematics Subject Classification (2000)

Navigation