skip to main content
10.1145/2799979.2800026acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method

Published:08 September 2015Publication History

ABSTRACT

The mathematical model of cryptosystem based on the method of gamma superposition, in which the algorithm of the inverse transformation of the closed text is reduced to the impossibility of problem solution is developed. The multiplicative knapsack task is generalized and the problem of working out of alphabetic cryptosystems mathematical models is considered. The mathematical models of such cryptosystems are offered in the article. The investigation is based on the C. Shannon, who considered, that cryptosystems containing Diophantine difficulties, possesses the greatest uncertainty of key selection process. Necessary and suffitient conditions at which generalized multiplicative knapsack is injective on Zp, p . 2, are established. The problem of building the isomorphic additive and multiplicative knapsacks is also considered.

References

  1. Shannon C. Communication theory of secrecy systems, Bell System Techn. J. 28, No. 4 - 1949. P. 656-715.Google ScholarGoogle ScholarCross RefCross Ref
  2. Diffie W., Hellman M. New directions in cryptography // IEEE Transactions on Information Theory. - 1976. - Vol. 22. - P. 644-654. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Merkle R., Hellman M. Hiding information and signatures in trapdoor knapsacks // IEEE Transactions on Information Theory. 1978. Vol. IT - 24. P. 525-530. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Merkle R., Hellman M. On the security of multiple encryption // Communications of the ACM. - 1981. - Vol. 24. P. 465-467. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Lenstra A.K., Lenstra H.W., Lovasz L. Factoring polynomials with rational coefficients // Mathematische Annalen. 1982. Vol. 261. P. 515-534.Google ScholarGoogle Scholar
  6. Shamir A. A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem // Information Theory, IEEE Transactions. - 1984. - Vol. 30, No.5. - P. 699-704. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Odlyzhko A.O. Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature scheme // IEEE Transactions on Information Theory. - Jul 1984. - vol. IT-30, No. 4. - p. 594-601. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chor B., Rivest R. A knapsack-type public key cryptoystem based on arithmetic in finite fields//IEEE Transactions on Information Theory. 1988. Vol. IT - 34. P. 901-909. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Salomaa A. Public-Key Cryptography Springer-Verlag Berlin Heidelberg New York London Paris Tokyo Hong Kong Barcelona.Google ScholarGoogle Scholar
  10. Koblitz N. A Course in Number Theory and Cryptography. Springer-Verlag New York. 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Schneir B. Applied Cryptography: Protocols, Algorithms and Source Code in C, 2nd edition. New York: J. Wiley & Sons, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Martello S. T.P. Knapsack problems : algorithms and computer implementations // Chichester: JOHN WILEY & SONS. -1990.- P. 137-138. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Vaudenay S. Cryptanalysis of the Chor-Rivest cryptosystem // CRYPTO. - 1998. - P. 243-256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Osipyan V.O. On One Generalization of Knapsack Cryptosystems // Izv. vuzov. Northern-Caucasus area. Tech. science. - 2003. - Appendix No.5. - p. 18-25.Google ScholarGoogle Scholar
  15. Osipyan V.O. Information protection systems based on functional knapsack problem // Voprosi zachiti informatsi. - M., 2004.- No.4. - c.16-19.Google ScholarGoogle Scholar
  16. Osipyan V.O. On Information Protection System Based on the nonstandard Knapsack Problem // Izv. vuzov. Tomsk Polytechnical University. - 2006. - v. 309. - No. 2. - p. 209-212.Google ScholarGoogle Scholar
  17. Osipyan V.O. Generalization of open key knapsack cryptosystems // Security of Information and Networks (SIN 2007). Trafford, 2008. P. 58-63.Google ScholarGoogle Scholar
  18. Osipyan V.O. Different models of information protection system, based on the functional knapsack // SIN'11 Proceedings of the 4th international conference on Security of information and networks, ACM, 2011. pp 215-218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Osipyan V.O. Building of data protection knapsacks cryptosystems with Diophantine problems. LAP LAMBERT Academic Publishing, 2012.Google ScholarGoogle Scholar
  20. Osipyan V.O. Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problems // SIN'12 Proceedings of the Fifth International Conference on Security of Information and Networks, ACM, 2012, pp.124-129. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Osipyan V.O. Information protection systems based on universal knapsack problem // SIN'13 Proceedings of the 6th International Conference on Security of Information and Networks, ACM, 2013, pp.343-346. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Osipyan V.O. Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack // SIN'14 Proceedings of the 6th International Conference on Security of Information and Networks, ACM, 2014, pp.123-128. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader