A public key Cryptography based on the m-injectivity of $Z_{p q}$ over itself

Downloads

Abstract

In this paper, we present a new public key scheme which is based on factoring, RSA encryption, proposed by Rivest-Shamir-Adleman(1978) [5]and discrete logarithm problem(DLP) [6], proposed by Diffie and Hellman[15], particularly, known as the Computational Diffie-Hellman Problem (CDH)[17]. The idea of DLP was mainly applied to groups, Finite fields and Elliptic Curves but in this paper, we are going to apply it to a particular ring $Z_{p q}$, where $p$ and $q$ are two large primes. The encryption and decryption processes of the proposed scheme uses the Elgamal encryption scheme related to DLP. Also, the proposed system benefits from the fact that this ring is $\mathrm{m}$-injective over itself i.e, the existence of many R-monomorphisms from this ring to itself, which are subjected to certain conditions.

Keywords:

m-injective, R-monomorphisms,, Public Key Cryptography, RSA Cryptosystem, Discrete Logarithm Problem, Computational Diffie-Hellman Problem

Mathematics Subject Classification:

Mathematics
  • Wannarisuk Nongbsap Department of Mathematics, St. Anthony’s College-793001, India.
  • Madan Mohan Singh Department of Basic Sciences and Social Sciences, North-Eastern Hill University, Shillong-793022, India
  • Pages: 130-135
  • Date Published: 01-01-2021
  • Vol. 9 No. 01 (2021): Malaya Journal of Matematik (MJM)

R. Baer, Abelian Groups that Are Direct Summands of Every Containing Abelian Group, Bull. Amer. Math. Soc., 46(1940), 800-806.

C. Faith, Algebra: Rings, Modules and Categories, I, Berlin, p. 157, 1973.

T. Y. Lam, Lectures on Modules and Rings, New York: Springer-Verlag, p. 63, 1999.

Y. Utumi, On Continuous Rings and Self Injective Rings, 1965, University of Rochester, Rochester, New York, (1965), 158-173.

E. Milanov, The RSA Algorithm, 3 June 2009.

K.S. McCurley, The Discrete Logarithm Problem, Proceedings of Symposia in Applied Mathematics, Volume 42,1990

P. Goswami, M.M.Singh, B.Bhuyan, A New Public Key Scheme based on Integer Factorization and Discrete Logarithm, Palestine Journal of Mathematics, 6(2)(2017), $580-584$

D. Poulakis, A Public Key Encryption Scheme Based on Factoring and Discrete Logarithm, Journal of Discrete Mathematical Sciences and Cryptography, 12:6(2009), $745-752$.

H. Elkamchouchi, K. Elshenawy and H.A.Shaban, Two New Public Key Techniques in the domain of Gaussian Integers, Proceedings of the Twentieth National Radio Science Conference, NRSC 2003 C17, 1-8(2003)

I. Niven, H.S. Zukerman, H.L. Montgomery, An Introduction to the Theory of Numbers, Fifth Edition, John Wiley and Sons, Inc., p.73, 2000

K.S.McCureley, A key distribution system equivalent to factoring, Journal of Cryptography, 1:2(1988), 95-106.

T.Elgamal, A public Key Cryptosystem and a Signature scheme based on discrete Logarithms, Journals and Magazine $>$ IEEE Transactions on Information Theory, $31(4)(1985), 409-472$.

B.R. Ambedkar, S.S. Bedi, A New Factorization Method to Factorize RSA Public Key Encryption, IJSCI International Journal of Computer Science, 8(6:1)(2011), 242247.

D.Boneh, G. Durfee, Cryptanalysis of RSA with Private Key d less than $N^{0.292}$, Computer Science Department, Stanford University, CA 94305-9045.

W. Diffie, M. Hellman, New Directions in Cryptography, IEEE Trans. Inform. Theory, 22(1976), 472-492

K. Rabah, Security of the Cryptographic Protocols Based on Discrete Logarithm Problem, Journal of Applied Sciences, 5(9)(2005), 1692-1712.

F. Bao, R.H. Deng, H.Zhu, Variations of Diffie-Hellman Problem, Variations of Diffie-Hellman Problem, Infocomm Security Department, Institute for Infocomm Research. 21 Heng Mui Keng Terrace, Singapore 119613

M. Kosters, Injective Modules and the Injective Hull of a Module, November 27, 2009.

Metrics

Metrics Loading ...

Published

01-01-2021

How to Cite

Wannarisuk Nongbsap, and Madan Mohan Singh. “A Public Key Cryptography Based on the M-Injectivity of $Z_{p q}$ over Itself”. Malaya Journal of Matematik, vol. 9, no. 01, Jan. 2021, pp. 130-5, https://www.malayajournal.org/index.php/mjm/article/view/986.