Skip to main content

Part of the book series: Graduate Texts in Mathematics ((GTM,volume 114))

  • 2219 Accesses

Abstract

Recall that a cryptosystem consists of a 1-to-1 enciphering transformation f from a set P of all possible plaintext message units to a set C of all possible ciphertext message units. Actually, the term “cryptosystem” is more often used to refer to a whole family of such transformations, each corresponding to a choice of parameters (the sets P and C, as well as the map f, may depend upon the values of the parameters). For example, for a fixed N-letter alphabet (with numerical equivalents also fixed once and for all), we might consider the affine cryptosystem (or “family of cryptosystems”) which for each a ∊ (Z/NZ)* and bZ/NZ is the map from P = Z/NZ to C = Z/NZ defined by C = aP + b mod N. In this example, the sets P and C are fixed (because N is fixed), but the enciphering transformation f depends upon the choice of parameters a, b. The enciphering transformation can then be described by (i) an algorithm, which is the same for the whole family, and (ii) the values of the parameters. The values of the parameters are called the enciphering key K E . In our example, K E is the pair (a, b). In practice, we shall suppose that the algorithm is publicly known, i.e., the general procedure used to encipher cannot be kept secret. However, the keys can easily be changed periodically and, if one wants, kept secret.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References for § IV.1

  1. M. Blum, “Coin-flipping by telephone — a protocol for solving impossible problems,” IEEE Proceedings‚ Spring Compcon., 133–137.

    Google Scholar 

  2. W. Diffie and M. E. Heilman, “New directions in cryptography,” IEEE Transactions in Information Theory IT-22 (1976), 644–654.

    Article  MATH  Google Scholar 

  3. M. E. Heilman, “The mathematics of public-key cryptography,” Scientific American‚ vol. 241 (1979), 146–157.

    Article  Google Scholar 

  4. E. Kranakis, Primality and Cryptography‚ John Wiley & Sons, 1986.

    MATH  Google Scholar 

  5. G. Ruggiu, “Cryptology and complexity theories,” Advances in Cryptology, Proceedings of Eurocrypt 84, Springer, 1985, 3–9.

    MathSciNet  Google Scholar 

References for § IV.2

  1. L. M. Adleman, R. L. Rivest and A. Shamir, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM‚ vol. 21 (1978), 120–126.

    Article  MATH  MathSciNet  Google Scholar 

  2. R. L. Rivest, “RSA chips (past/present/future),” Advances in Cryptology‚ Proceedings of Eurocrypt 84, Springer, 1985, 159–165.

    MathSciNet  Google Scholar 

  3. J. A. Gordon, “Strong primes are easy to find,” Advances in Cryptology, Proceedings of Eurocrypt 84‚ Springer, 1985, 216–223.

    Google Scholar 

References for § IV.3

  1. L. M. Adleman, “A subexponential algorithm for the discrete logarithm problem with applications to cryptography,” Proceedings of the 20th Annual Symposium on the Foundations of Computer Science (1979), 55–60.

    Google Scholar 

  2. D. Coppersmith, “Fast evaluation of logarithms in fields of characteristic two,” IEEE Transactions in Information Theory IT-30 (1984), 587–594.

    Article  MATH  MathSciNet  Google Scholar 

References for § IV.4

  1. M. R. Garey and D. S. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, W. H. Freeman, 1979.

    MATH  Google Scholar 

  2. R. M. F. Goodman and A. J. McAuley, “A new trapdoor knapsack public key cryptosystem,” Advances in Cryptography, Proceedings of Eurocrypt 84, Springer, 1985, 150–158.

    MathSciNet  Google Scholar 

  3. M. E. Heilman, “The mathematics of public-key cryptography,” Scientific American‚ vol. 241 (1979), 146–157.

    Article  Google Scholar 

  4. M. E. Heilman and R. C. Merkle, “Hiding information and signatures in trapdoor knapsacks,” IEEE Transactions in Information Theory IT-24 (1978)‚ 525–530.

    Article  Google Scholar 

  5. A. Shamir, “A polynomial time algorithm for breaking the basic Merkle- Hellman cryptosystem,” Proceedings of the 23rd Annual Symposium on the Foundations of Computer Science (1982), 145–152.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1987 Springer-Verlag New York Inc.

About this chapter

Cite this chapter

Koblitz, N. (1987). Public Key. In: A Course in Number Theory and Cryptography. Graduate Texts in Mathematics, vol 114. Springer, New York, NY. https://doi.org/10.1007/978-1-4684-0310-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-1-4684-0310-7_4

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4684-0312-1

  • Online ISBN: 978-1-4684-0310-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics