RSA ENCRYPTION USING THREE MERSENNE PRIMES

Similar documents
Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Chapter 8 Public-key Cryptography and Digital Signatures

Slides by Kent Seamons and Tim van der Horst Last Updated: Oct 1, 2013

10 Modular Arithmetic and Cryptography

Lecture V : Public Key Cryptography

Lecture 1: Introduction to Public key cryptography

CIS 551 / TCOM 401 Computer and Network Security

CRYPTOGRAPHY AND NUMBER THEORY

The RSA cryptosystem and primality tests

An Introduction to Probabilistic Encryption

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

NET 311D INFORMATION SECURITY

Public Key Algorithms

Public Key Cryptography

RSA. Ramki Thurimella

Cryptography. P. Danziger. Transmit...Bob...

Lemma 1.2. (1) If p is prime, then ϕ(p) = p 1. (2) If p q are two primes, then ϕ(pq) = (p 1)(q 1).

Week 7 An Application to Cryptography

Public Key Cryptography

Theme : Cryptography. Instructor : Prof. C Pandu Rangan. Speaker : Arun Moorthy CS

dit-upm RSA Cybersecurity Cryptography

Cryptography. pieces from work by Gordon Royle

Implementation of the RSA algorithm and its cryptanalysis. Abstract. Introduction

10 Public Key Cryptography : RSA

AN INTRODUCTION TO THE UNDERLYING COMPUTATIONAL PROBLEM OF THE ELGAMAL CRYPTOSYSTEM

ECE596C: Handout #11

Discrete Mathematics GCD, LCM, RSA Algorithm

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

RSA RSA public key cryptosystem

LECTURE 5: APPLICATIONS TO CRYPTOGRAPHY AND COMPUTATIONS

Math 412: Number Theory Lecture 13 Applications of

Congruence of Integers

Chapter 4 Asymmetric Cryptography

Asymmetric Cryptography

Mathematics of Cryptography

Addition. Ch1 - Algorithms with numbers. Multiplication. al-khwārizmī. al-khwārizmī. Division 53+35=88. Cost? (n number of bits) 13x11=143. Cost?

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

8.1 Principles of Public-Key Cryptosystems

Asymmetric Encryption

NUMBER THEORY AND CODES. Álvaro Pelayo WUSTL

Implementation Tutorial on RSA

and Other Fun Stuff James L. Massey

Number Theory & Modern Cryptography

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Encryption: The RSA Public Key Cipher

Blind Signature Protocol Based on Difficulty of. Simultaneous Solving Two Difficult Problems

Solution to Midterm Examination

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Introduction to Modern Cryptography. Lecture RSA Public Key CryptoSystem 2. One way Trapdoor Functions

Gurgen Khachatrian Martun Karapetyan

Public Key Cryptography. All secret key algorithms & hash algorithms do the same thing but public key algorithms look very different from each other.

THE RSA ENCRYPTION SCHEME

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

MATHEMATICS EXTENDED ESSAY

Ma/CS 6a Class 3: The RSA Algorithm

Cryptography IV: Asymmetric Ciphers

Public-Key Cryptosystems CHAPTER 4

Ti Secured communications

THE RSA CRYPTOSYSTEM

Pseudo-random Number Generation. Qiuliang Tang

Cryptography and RSA. Group (1854, Cayley) Upcoming Interview? Outline. Commutative or Abelian Groups

Introduction to Modern Cryptography. Benny Chor

A New Attack on RSA with Two or Three Decryption Exponents

Algorithmic Number Theory and Public-key Cryptography

Powers in Modular Arithmetic, and RSA Public Key Cryptography

NUMBER THEORY FOR CRYPTOGRAPHY

University of Tokyo: Advanced Algorithms Summer Lecture 6 27 May. Let s keep in mind definitions from the previous lecture:

Cryptography. Course 1: Remainder: RSA. Jean-Sébastien Coron. September 21, Université du Luxembourg

Analysis of the RSA Encryption Algorithm

My brief introduction to cryptography

Cryptography and Security Midterm Exam

Number Theory. Modular Arithmetic

Candidates must show on each answer book the type of calculator used. Only calculators permitted under UEA Regulations may be used.

Number Theory in Cryptography

CRYPTOGRAPHY AND LARGE PRIMES *

Jong C. Park Computer Science Division, KAIST

Chapter 7: Signature Schemes. COMP Lih-Yuan Deng

COMP424 Computer Security

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Public Key Cryptography

New attacks on RSA with Moduli N = p r q

5199/IOC5063 Theory of Cryptology, 2014 Fall

Lecture Notes, Week 6

RSA Algorithm. Factoring, EulerPhi, Breaking RSA. Çetin Kaya Koç Spring / 14

ICS141: Discrete Mathematics for Computer Science I

A Comparative Study of RSA Based Digital Signature Algorithms

COMP4109 : Applied Cryptography

Cryptographical Security in the Quantum Random Oracle Model

RSA Cryptosystem and Factorization

Other Public-Key Cryptosystems

Attacks on RSA & Using Asymmetric Crypto

Introduction to Cybersecurity Cryptography (Part 5)

Outline. Available public-key technologies. Diffie-Hellman protocol Digital Signature. Elliptic curves and the discrete logarithm problem

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Great Theoretical Ideas in Computer Science

Introduction to Cryptography. Susan Hohenberger

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Chapter 11 : Private-Key Encryption

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

An Introduction to Cryptography

Transcription:

Int. J. Chem. Sci.: 14(4), 2016, 2273-2278 ISSN 0972-768X www.sadgurupublications.com RSA ENCRYPTION USING THREE MERSENNE PRIMES Ch. J. L. PADMAJA a*, V. S. BHAGAVAN a and B. SRINIVAS b a Department of Mathematics, KL University, Vaddeswaram (A.P.) INDIA b Government Polytechnic for Minorities, GUNTUR (A.P.) INDIA ABSTRACT As the internet evolves and computer networks become accessible, most business transactions are done over the internet. Potential threat to the information is always present and attempts are being made to provide maximum security over the network. One of such new techniques is using multiple prime numbers for RSA cryptosystem, which is not easily breakable. Also, typical prime numbers are used in order to strengthen the algorithm to ensure safe data exchange. In this paper, we used three Mersenne prime numbers to construct a new RSA cryptosystem which provides more efficiency and reliability over the network. Mathematics Subject Classification (2010): 11T71, 14G50, 68P25, 94A60 Key words: Factorization, Mersenne prime, Symmetric key. INTRODUCTION The fundamental objective of cryptography is to enable two people to communicate over an insecure channel in such a way that an opponent cannot understand what is being said. The sender encrypts a plain text using a predetermined key and sends the resultant cipher text over the channel. An intruder, upon seeing the cipher text over the channel cannot determine what the original message was; but the receiver who knows the encryption key can decrypt the cipher text and reconstruct the plain text 1. Mathematically, a cryptosystem is a five-tuple (P, C, K, E, D) where: 1. P is the finite set of possible plaintexts 2. C is the finite set of possible cipher texts. 3. K is the keyspace, finite set of possible keys. 4. For each k Є K, there is an encryption rule e k Є E and a corresponding decryption rule d k Є D. * Author for correspondence; E-mail: padmajachivukula@gmail.com

2274 Ch. J. L. Padmaja et al.: RSA Encryption Using Three. Each e k : P C and dk: C P are functions such that d k (e k (x)) = x for every x Є P. Public key cryptosystem In symmetric key cryptosystems or private key cryptosystems, d k (decryption key) is either the same as e k (encryption key) or easily derived from it. It means the exposure of either e k or d k renders the system insecure. In a public key cryptosystem, it is computationally infeasible to determine d k given e k. The encryption rule e k is public key, which could be published in a directory. The decryption rule d k is the private key which is kept secret with the receiving person 1. The best known and most widely used public key system is RSA, which was first proposed by Rivest et al. 2 It is an asymmetric (public key) cryptosystem based on number theory. Its security is based on the difficulty of factorization of the large number which is a well known mathematical problem. Breaking RSA is at least as hard as factoring n. Factoring large numbers is not probably hard but no efficient algorithm exists today to break in a reasonable amount of time. In order to strengthen the security of RSA several modifications in the algorithm are made. A modified RSA encryption was suggested by Ivy et al. 3 using n prime numbers instead of two. A further attempt was made at the use of two Mersenne primes because of the fact that small primes are used to generate large Mersenne primes 4. An attempt has been made in this paper to present the mathematics behind the RSA cryptosystem, existing algorithm and propose a new algorithm using three Mersenne primes numbers. Mathematics behind RSA This cryptosystem uses computations in Zn. Let n = p x q, where p and q are distinct primes. Let P = C = Z n, and K = (n, p, q, e, d). Define e K (x) = x e mod n = y and d K (y) = y d mod n for (x,y Є Zn). The public values are (n,e) and secret values are (p, q, d). Note that φ(n) = (p-1) (q-1). We will now verify the decryption. Since ed 1(mod φ(n)), there is an integer k such that ed = k. φ(n)+1 We have (x e ) d = x k. φ(n)+1 = x 1+k(p-1)(q-1) = x.(x p-1 ) k.(q-1) º x (mod p)

Int. J. Chem. Sci.: 14(4), 2016 2275 [Since by Fermat theorem, x p-1 1 mod p] Therefore, x ed x (mod p). Similarly, x ed x (mod q). By definition, there must be two integers r and s such that x ed -x = p.r = q.s. Since p and q are distinct primes, either p must be a factor of s or q must be a factor of r due to the unique prime factorization. There has to be an integer s such that x ed -x = qs = qps, i.e. n = p. q divides x ed - x. x ed x (mod n). Therefore, d k (e k (x)) = d K (x e mod n) = (x e mod n) d mod n = x ed mod n = x mod n and e K (d K (x)) = x in Zn. The idea behind today s RSA cryptosystem is 1. Prime number generation is easy. It is easy to find a random prime number of given size. 2. Multiplication is easy. Given p and q, it is easy to find their product n = p.q 3. Factoring is hard. Given such n, it is deemed to be quite hard to recover the prime numbers p, q. Existing RSA algorithm Key generation: Select two prime numbers, p and q and p q. Calculate n = p x q. Calculate φ(n) = (p -1) x (q-1). Select integer e such that gcd (e, φ (n)) = 1; 1 < e < φ (n). Calculate private key d = e -1 (mod φ (n)). Then public key = {e, n}. Private key = {d, n}. Encryption: c = m e mod n. Decryption: m = c d mod n. Where, c - cipher text, m - message Mersenne primes Mersenne number is named after a French Monk, Marin Mersenne who studied these

2276 Ch. J. L. Padmaja et al.: RSA Encryption Using Three. numbers in early 17 th century. These numbers are of the form 2 p -1 where p is itself a prime number and are represented as M p = 2 p -1. The first few Mersenne prime numbers are 1, 3, 7, 15, 31, 63, 127, 255,... A total of 48 Mersenne primes are known as of October 2014. The largest known Mersenne prime 5 is 2 57,885,161 1. Proposed RSA algorithm To increase the complexity of the RSA algorithm, a new component r is added and explained below. Key generation: Receiver chooses three Mersenne primes p, q and r. Computes n = p.q.r and φ(n) = (p-1)(q-1)(r-1) Chooses e, 1 < e < φ (n) such that gcd (e, φ (n)) = 1 Finds d such that ed = 1 mod φ (n). Now the receiver s public key pair is (n, e) and private key is d. Encryption: To encrypt a message m, the sender computes, c = m e mod n and sends this to the receiver. Decryption: To decrypt c, the receiver computes m= c d mod n Implementation We carry an RSA encryption with artificially small parameters. B is the message originator and A is the receiver. Key generation: A chooses three Mersenne primes p = 3, q =7 and r = 15 Computes n = p.q.r = 315 and φ (n) = (p-1)(q-1)(r-1) = 168. Chooses e = 79 such that gcd (e, φ (n)) = 1 Using extended Euclidean algorithm finds d =151 such that ed = 1 mod φ (n). Now A s public key pair is (n = 315, e =79), while A's private key is d =151.

Int. J. Chem. Sci.: 14(4), 2016 2277 Encryption: To encrypt a message m = 52, B computes, c = m e mod n = 52 79 mod 315 3.6666051757388353917113336844361e+135 mod 315 = 178 and sends this to A. Decryption: To decrypt c, A computes m= c d mod n = 178 151 mod 315 = 6.5075924802805196719974005781156e + 339 mod 315 = 52 The flow chart given below explains the proposed RSA algorithm, which is adapted here in this paper. Start Input Mersenne prime numbers p,q,r Compute n=p*q*r φ(n) = (p-1)*(q-1)*(r-1) Input e 1 < e < φ (n) gcd (e, φ (n)) = 1 Compute ed 1 mod φ(n) Input message = m Compute c e c = m mod n Compute m m = c d mod n End

2278 Ch. J. L. Padmaja et al.: RSA Encryption Using Three. CONCLUSION In this paper, we have proposed RSA algorithm using three Mersenne primes as against the traditional RSA algorithm of two normal primes. The important aspect of RSA cryptography is the selection of public key and generation of private key. Public key can be generated randomly. The security of RSA is based on the hope that the encryption function is one way and so it is computationally infeasible for an intruder to decrypt a cipher text. Mersenne primes are used to enhance the security. The strength of large prime number is dependent on three factors, p, q, and r. It is deemed to be difficult to break the large number into three. If any algorithms are developed in future that makes factorization of a large prime feasible, usage of three primes instead of two can increase the strength of that algorithm. Here, the algorithm is generated using only small numbers, but real problems can be implemented using MATLAB for verification of the proposed algorithm. REFERENCES 1. D. R. Stinson, Cryptography, Theory and Practice, 3 rd Ed., CRC Press, Boca Raton, FL (2002). 2. R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of ACM, 21(2), 120-126 (1978). 3. B. P. U. Ivy, P. Mandiwa and M. Kumar, A Modified RSA Cryptosystem Based on n Prime Numbers, Int. J. Engg. Comput. Sci., 1(2), 62-66 (2012). 4. S. Pund and C. Desai, Implementation of RSA Algorithm using Mersenne Prime, Int. J. Networking & Parallel Computing, 1(2), 33-41 (2013). 5. https://en.wikipedia.org/wiki/mersenne_prime. Revised : 13.08.2016 Accepted : 16.08.2016