A public key cryptosystem using normal bases over finite fields
P. L. Sharma*, Kiran Devi
Department of Mathematics and Statistics, Himachal Pradesh University, Shimla 171 005, India
*Corresponding Author Email: plsharma1964@gmail.com
ABSTRACT:
Normal bases and matrices are widely used in cryptography to enhance the speed of cryptographic algorithms and provide security to the messages which travel through the insecure channels. We propose a public key cryptosystem using normal bases and trace mapping of normal elements over finite fields.
KEYWORDS: Normal basis; Trace mapping; Normal element; Finite Field; Helical traverse form.
Mathematics Subject Classification (2010): 11T71, 94A60, 14G50, 68P25.
INTRODUCTION:
The security of information, integrity of data and confidentiality of messages through insecure channels has become the major issue today. Cryptography is the technique which is used to protect the data which travel through the internet and intranet. The different branches of mathematics like matrix analysis, number theory, rhotrices theory, finite fields , logical operators are used to built the cryptosystems for encryption and decryption processes, see [4, 5, 10, 11-19, 26-27, 32 ]. Various cryptosystems [2, 9, 20-23, 31] provide security in emails, ATM machines, cellular phones, e-commerce, digital signatures and online transactions in banking sectors.
Different types of cryptosystems are
studied by several mathematicians which are based on matrices, see [24, 28].
Massey and Omura [6, 7] invented a multiplier which obtains the product of two
elements in finite field using the normal bases.
Normal bases are used in squaring and multiplication of an element in finite
field which can be easily done by a cyclic bit shift of binary digits, see [3,
25, 29, 30]. Due to fast exponentiation and cyclic bit shift operations normal
bases are used at large scale. This can be easily seen in word level normal
bases multiplier and reordered normal bases multipliers.
Matrix based asymmetric bulk encryption and public key cryptography with matrices is given in [8]. Security can be easily enhanced in cloud computing and cryptographic mechanism using public key and matrices, see [1]. We proposed a public key cryptosystem which contains mainly generation of data matrix, key generation, encryption, decryption process by using normal bases over finite fields and XOR operator.
which is the original data matrix of the
text message. The first row of this matrix is the first element
of the
normal basis set, which is the alphabet
Similarly, other rows
give the other elements of the normal basis set which corresponds to the
different characters of the text message. Hence, the receiver will get the
original message Maths
back.
ACKNOWLEDGMENT:
Authors acknowledge the support of UGC - SAP.
REFERENCES:
1. B. Goswami and S. Singh, Enhancing security in cloud computing using public key cryptography with matrices, IJERA, 2(4): 2012, 339-344.
2. B. Schneier, Applied Cryptography, John Wiley & Sons, New York, Second Edition, 1996.
3. C. C. Wang, An algorithm to design finite field multipliers using a self dual normal basis, IEEE Trans. Comput., 38(10): 1989, 1457-1460.
4. D. R. Stinson, Cryptography: Theory and Practice, Third Edition, Chapman & Hall/CRC, 2006.
5. G. L. Mullen and D. Panario, Handbook of Finite Fields, CRC Press, 2013.
6. J. L. Massey and J. K. Omura, Computation method and apparatus for finite field arithmetic, US Patent No. 4587627, 1986.
7. M. A. Hasan, M. Z. Wang and V. K. Bhargava, A modified Massey--Omura parallel multiplier for a class of finite fields, IEEE Trans. Comput., 42: 1993, 1278--1280.
8. M. K. Singh, Public key cryptography with Matrices, Proceeding for 2004 IEEE workshop on Informaton assurance, 2004.
9. N. Koblitz, A Course in Number Theory and Cryptography, Second Edition, Springer, 1994.
10. P. L. Sharma and R. K. Kanwar, Adjoint of a rhotrix and its basic properties, International Journal of Mathematical Sciences, 11(3-4): 2012, 337-343.
11. P. L. Sharma and R. K. Kanwar, The Cayley-Hamilton theorem for rhotrices, International Journal Mathematics and Analysis, 4(1): 2012, 171-178.
12. P. L. Sharma and M. Rehan, On Security of hill cipher using finite fields, International Journal of Computer Applications, 71(4): 2013, 30-33.
13. P. L. Sharma and R. K. Kanwar, On involutory and pascal rhotrices, International J. of Math. Sci. & Engg. Appls. (IJMSEA), 7(4): 2013, 133-146.
14. P. L. Sharma and S. Kumar, On construction of MDS rhotrices from companion rhotrices over finite field, International Journal of Mathematical Sciences, 12(3-4): 2013, 271-286.
15. P. L. Sharma, S. Kumar and M. Rehan, On
vandermonde and MDS rhotrices over , International Journal
of Mathematics and Analysis, 5( 2): 2013, 143-160.
16. P. L. Sharma, S. Kumar and M. Rehan, On hadamard rhotrix over finite field, Bulletin of Pure and Applied Sciences, 32(2): 2013, 181-190.
17. P. L. Sharma and S. Kumar, Balanced incomplete block design (BIBD) using hadamard rhotrices, International Journal of Technology, 4(1): 2014, 62-66.
18. P.L. Sharma and M. Rehan, Modified hill cipher using vandermonde matrix and finite field, International Journal of Technology, 4(1): 2014, 252- 256.
19. P. L. Sharma and S. Kumar, Some applications of hadamard rhotrices to design balanced incomplete block, International J. of Math. Sci. & Engg. Appls., 8(II): 2014, 389-404.
20. P. L. Sharma and N. Dhiman, Generalization of cross-correlation in boolean functions and some generalized constructions in gbent functions, Asian-European Journal of Mathematics, 9(1): 2016, 1650019 (7 pages).
21. P. L, Sharma and S. Sharma, Hill cipher cryptosystem using irreducible polynomials over finite fields, Himachal Pradesh University Journal (HPUJ), 3(2): 2015, 44-52.
22. P. L. Sharma and N. Dhiman, A
characterization theorem for gbent function over, Journal of
Combinatorics, Information & System Sciences (JCISS), 41(2): 2016, 47-55.
23. P. L. Sharma and K. Devi, An elliptic curve cryptosystem over finite fields, Himachal Pradesh University Journal (HPUJ), 3(2): 2015, 1-12.
24. T. Elgamal, A Public key cryptosystem and signature scheme based on discrete algorithms, IEEE transactions on information Theory, 31: 1985, 469-472.
25. R. Dahab etal., Software multiplication using gaussian normal bases, IEEE Trans. Comput., 55: 2006, 974--984.
26. R. Lidl and H. Niederreiter, Introduction to finite fields and their applications, Cambridge University Press, First edition, 1986.
27. R. Lidl and H. Niederreiter, Finite Fields, Cambridge University Press, second edition, 1997.
28. R. Rivest, A. Shamir and L. Aldeman, A method for obtaining digital signatures and public- key cryptosystems, Commun. ACM, 21(2): 1978, 120-126.
29. S. Gao, J. Vonzur Gathen, D. Panario and V. Shoup, Algorithms for exponentiation in finite fields, J. Symb. Comput., 29(6): 2000, 879--889.
30. S. Gao, Normal bases over finite fields, Ph.D. thesis, University of Waterloo, Canada, 1993.
31. W. Stallings, Cryptography and Network Security, Fourth Edition, Pearson, 2006.
32. Z. X. Wan, Lectures on finite fields and Galois rings, Singapore: World Scientific, 2003.
Received on 23.08.2016 Accepted on 08.09.2016 © EnggResearch.net All Right Reserved Int. J. Tech. 2016; 6(2): 143-149. DOI: 10.5958/2231-3915.2016.00023.7 |
|