The Cubic Public-Key Transformation
This note proposes the use of the cubic transformation for public-key applications and random event and number generation, in a manner akin to the Rabin cipher. Transformations modulo a prime p or a composite n = pq, where p and q are primes, are so used that each transformed value has only three ro...
Saved in:
Published in | Circuits, systems, and signal processing Vol. 26; no. 3; pp. 353 - 359 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Cambridge
Springer Nature B.V
01.06.2007
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | This note proposes the use of the cubic transformation for public-key applications and random event and number generation, in a manner akin to the Rabin cipher. Transformations modulo a prime p or a composite n = pq, where p and q are primes, are so used that each transformed value has only three roots. Such a transformation, together with additional tag information, makes it possible to uniquely invert each transformed value. The effectiveness of the method as a random number generator (used in a variant with nine roots) comes from the fact that the cryptanalyst must contend with a ninefold branching at each step. [PUBLICATION ABSTRACT] |
---|---|
ISSN: | 0278-081X 1531-5878 |
DOI: | 10.1007/s00034-006-0309-x |