Abstract
We present a stream cipher based on mathematical considerations which is much faster then many other mathematical ciphers. Its security is based on the uniformity of the distribution of the quadratic symbol in function fields.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
M. Anshel and D. Goldfeld, Zeta functions, one-way functions, and pseudorandom number generators, Duke Mathematical Journal 88 (1997), 371–390.
M. Anshel and D. Goldfeld, Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions, U.S. Patent 5,577,124 (1996).
E. Bombieri and J.B. Friedlander Dirichlet polynomial approximations to zeta functions, Ann. Scuola norm. Sup. Pisa. Cl. Sci. 22 (1995), 517–544.
D. Boneh and R. Lipton, Algorithms for black-box fields and their applications to cryptography, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 1109 (1996), 283–297.
H. Cohen, A Course in Computational Number Theory, Grad. Texts in Math., Graduate Texts in Mathematics, 138 (1993), Springer-Verlag, New York.
T. W. Cusic, C. Ding and A. Renvall, Stream ciphers and number theory, Elsevier, Amsterdam, 1998.
F. Diamond, On deformation rings and Hecke rings,Annals of Math., 144 (1996), 137–166.
I. B. Damgård, On the randomness of Legendre and Jacobi sequences, Lect. Notes in Comp. Sci., Springer-Verlag, Berlin, 403 (1990), 163–172.
D. Goldfeld and J. Hoffstein, On the number of Fourier coefficients that determine a modular form, A Tribute to Emil Grosswald: Number Theory and Related Analysis, Comtemp. Math 143 (1993) 385–393.
C. Mauduit and A. Sárközy, On finite pseudorandom binary sequences I: Measure of pseudorandomness, the Legendre symbol, Acta Arithm., 82 (1997), 365–377.
M. Naor and O. Reingold, Number-theoretic constructions of efficient pseudorandom functions, Proc. 38th IEEE Symp. on Foundations of Comp. Sci. (FOCS’97), Miami Beach, IEEE (1997), 458–467.
R. Peralta, On the distribution of quadratic residues and nonresidues modulo a prime number, Math. Comp., 58 (1992), 433–440.
R. Taylor and A. Wiles, Ring-theoretic properties of certain Hecke algebras, Annals of Math. 141 (1995), 553–572.
A. Weil, On the Riemann hypothesis in function fields, Proc. Nat. Acad. Sci. U.S.A. 27 (1941), 45–347.
A. Wiles, Modular elliptic curves and Fermat’s last theorem, Annals of Math. 141 (1995), 443–551.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer Basel AG
About this paper
Cite this paper
Hoffstein, J., Lieman, D. (2001). The Distribution of the Quadratic Symbol in Function Fields and a Faster Mathematical Stream Cipher. In: Lam, KY., Shparlinski, I., Wang, H., Xing, C. (eds) Cryptography and Computational Number Theory. Progress in Computer Science and Applied Logic, vol 20. Birkhäuser, Basel. https://doi.org/10.1007/978-3-0348-8295-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-0348-8295-8_7
Publisher Name: Birkhäuser, Basel
Print ISBN: 978-3-0348-9507-1
Online ISBN: 978-3-0348-8295-8
eBook Packages: Springer Book Archive