A Modified Variant of RSA
Algorithm for Gaussian Integers
School of Studies in Mathematics Pt. Ravishankar
Shukla University, India
*Corresponding Author
Email: sushpradhan@gmail.com; shramabk07@gmail.com
ABSTRACT:
A Gaussian prime is a Gaussian integer that cannot be
expressed in the form of the product of other Gaussian integers. The concept of
Gaussian integer was introduced by Gauss who proved its unique factorization
domain. In this paper, we propose a modified RSA variant using the domain of
Gaussian integers providing more security as compare to the old one.
KEY WORDS: RSA Public-key cryptosystem, Gaussian integers
RSA, Multiprime
1. INTRODUCTION:
RSA system is the one of most practical public key
password systems. In addition to other domain, it has successfully provided
security to the electronic based commerce. Encryption of plaintext in
asymmetric key encryption is based on a public key and a corresponding private
key. Document authentication and digital signature are other advantages of RSA
public key cryptosystem.RSA provides security to the plaintext based on
factorization problem. There are PKC’s other than RSA. Those are Elgamal and Rabin’s PKC’s. These PKC’s provide security
based Discrete logarithm problem.
The classical RSA cryptosystem is described in the setting of the ring
Zn, the ring of integers modulo a composite integer n = pq, where p and q are two distinct odd prime
integers. Many aspects of arithmetic’s over the domain of integers can be
carried out to the domain of Gaussian integers Z[i],
the set of all complex numbers of the form a + bi, where a and b are integers.
The RSA cryptosystem was extended domain of Gaussian Integers in the papers [3]
and [4]. In [3] and [4] the advantages of such extension of RSA were briefly
stated in these papers.
Now in this paper, another fast variants of RSA cryptosystems is
proposed using arithmetic’s modulo of Gaussian integers. Proposed scheme
provides more security with same efficiency. Before doing so, in next section, we
review the classical RSA PKC. Next, we introduced Gaussian integers and its
properties in section 3. In section 4, we present a variant of RSA scheme based
on factorization of Gaussian integers with a suitable example. Finally, we
conclude with security analysis and comparison with the standard method.
2. RSA Public-Key Cryptosystem:
The classical RSA cryptosystem is described as follows: entity A
generates the public-key by first generating two large random odd prime
integers’ p and q, each roughly of the same size. Then, entity A computes the
modulus n = p q and
To encrypt a message, entity B first represents the message as an
integer m in Zn. Then, entity B obtains A’s public-key (n, e) and use it to
compute the cipher text
3. Gaussian Integers:
Gaussian integer is a complex number a + bi where both a and b is integers:
Z[i] = a+bi: a,b
Gaussian primes are Gaussian integer’s z = a+bi
satisfying one of the following properties:
1. If both a and b are nonzero then, (a+bi) is
a Gaussian prime iff
ordinary prime.
2. If a = 0, then bi is a Gaussian prime iff
3. If b = 0, then
J.T. Cross [2] gave a full description for complete residue systems
modulo prime powers of Gaussian integers.
4. RSA algorithms over the field of Gaussian
Integers:
In paper [4] the RSA is extended into the field of Gaussian integers. It
is presented
as follows:
Key Generation:
Generate two large Gaussian primes P and Q. Compute N = PQ.
Compute
Encryption:
Given a message M (represented as a Gaussian integer) compute ciphertext
Decryption:
Compute the original message
Now we propose the algorithms for the variant of RSA cryptosystem in Z[i] as
below:
Key Generation:
Generate b distinct large Gaussian primes
Compute
Compute
Select a random integer e such that 1 < e <
Compute
Pair (N, e) is a public key, and
Encryption:
Given a message M (represented as a Gaussian integer) compute cipher
text
Decryption:
Compute the original message
Following is the example in support of proposed algorithm.
Example:
Key generation
Let’s select
Compute the product N =
Choose e = 3331.
Then
The public key is n = 285, e = 3331
Encryption:
Let message M = m1; m2 = (555, 444)
C = (c1; c2) =
=
= (270, 159)
Decryption:
= (270, 159) mod 285
= (555, 444)
5. Security Analyses:
The comparison of the classical RSA [11], its Gaussian Integer Domain in
Z[i] [4]
and our proposed scheme is as follows:
·
The generation of primes p, q in classical scheme and
Gaussian primes a, b in Z[i] require the same amount
of computation. Same in the case with our proposed scheme where an additional
prime g in the form of 4k+3 would be generated with the same computation.
·
The modified Gaussian variant provides more security than
the classical method since the number of elements which are chosen to represent
the message m is about square of those used in the classical case. Our proposed
scheme would provide security as compare to Gaussian variant. Because, domain
Z[i] in our proposed scheme provides a more extension
to the range of chosen messages, which make trails more complicated as compare
to the Gaussian integer domain [4].
·
In [4], Euler phi function is
·
It is noted that the complexity for programs depends on
the complexity of generating the public-key. Thus, the classical and proposed
algorithms are equivalent since their public-key generation algorithms are
identical when restricting the choice of primes to those of the form 4k+3.
However, our scheme is recommended since it provides a better extension to the
message space and the public exponent range as compare to classical one.
6. CONCLUSION:
We modify the computational methods in the domain of Gaussian integers.
Lastly,
We show how the modified computational methods can be used to extend the
RSA algorithm to the domain Z[i]. Also, we show that
the modified algorithm requires a little additional computational effort than
the classical one and accomplishes much greater security.
7. REFERENCES:
1.
Collins, T., Hopkins, D., Langford, S., Sabin, M.: Public
Key Cryptographic Apparatus and, Method. U.S.Patent
#5, 848, 159, January (1997).
2.
Cross, J.T. : The Eulers f -function in the Gaussian integers. Amer. Math.
55, 518–528 (1995)
3.
Diffie, W., Hellman, M. :
New Directions in Cryptography. IEEE Trans. on Inform. Theory, IT-22, 644–654
(1976)
4.
Elkamchouchi, H., Elshenawy, K., Shaban, H.:
Extended RSA cryptosystem and digital signature schemes in the domain of
Gaussian integers, The 8th International Conference on Communication Systems, 1
(ICCS’02), 91–95 (2002)
5.
El-Kassar, A.N., Haraty, R., Awad, Y., Debnath, N.C.: Modified RSA in the domains of Gaussian
integers and polynomials over finite fields. Proc. Intl. Conf. Computer
Applications in Industry and Engineering - CAINE, 298-303 (2005)
6.
Gauss, C.F. :Theoria
residuorum biquadraticorum.
Comm. Soc. Reg. Sci. Gottingen 7, 1–34 (1832)
7.
Jason Hinek, M.: Low Public
Exponent Partial Key and Low private Exponent Attacks on Multi-prime rsa. Master Thesis, Waterloo, Ontario-Canada (2002)
8.
Haraty, R.A., El-Kassar,
A.N., Shibaro, B.: A
Comparative Study of RSA Based Digital Signature Algorithms. Journal of
Mathematics and Statistics 2, 354–359 (2006)
9.
Menezes, A., Van Oorshot,
J., Vanstone, P.C.S.A.: Handbook of Applied Cryptography. CRC Press, (1997)
10.
Niven, I., Zukerman, H.S., Montegomery, H.L.: An introduction to the theory of numbers.John Wiley, New York (1991)
11.
Rivest, R., Shamir, A., Adleman,
L.: A Method for Obtaining Digital Signatures and Public Key Cryptosystems.
Communications of the ACM 21, 120–126 (1978)
Received on 17.02.2013 Accepted on 02.03.2013
Modified on 06.03.2013©A&V Publications all right reserved
Research J. Science and Tech 5(3): July- Sept., 2013 page 300-302