SlideShare a Scribd company logo
IOSR Journal of Mathematics (IOSR-JM)
e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 11, Issue 1 Ver. III (Jan - Feb. 2015), PP 01-03
www.iosrjournals.org
DOI: 10.9790/5728-11130103 www.iosrjournals.org 1 |Page
A Public-Key Cryptosystem Based On Discrete Logarithm
Problem over Finite Fields 𝐅𝐩 𝐧
Saju M I1
, Lilly P L2
1Assistant Professor, Department of Mathematics, St. Thomas’ College, Thrissur, India
2Associate professor, Department of Mathematics, St. Joseph’s College, Irinjalakuda, India
Abstract: One of the classical problems in mathematics is the Discrete Logarithm Problem (DLP).The
difficulty and complexity for solving DLP is used in most of the cryptosystems. In this paper we design a public
key system based on the ring of polynomials over the field 𝐹𝑝 is developed. The security of the system is based
on the difficulty of finding discrete logarithms over the function field 𝐹 𝑝 𝑛 with suitable prime p and sufficiently
large n. The presented system has all features of ordinary public key cryptosystem.
Keywords: Discrete logarithm problem, Function Field, Polynomials over finite fields, Primitive polynomial,
Public key cryptosystem.
I. Introduction
For the construction of a public key cryptosystem, we need a finite extension field Fpn overFp. In our
paper [1] we design a public key cryptosystem based on discrete logarithm problem over the field F2. Here, for
increasing the complexity and difficulty for solving DLP, we made a proper additional modification in the
system. A cryptosystem for message transmission means a map from units of ordinary text called plaintext
message units to units of coded text called cipher text message units.
The face of cryptography was radically altered when Diffie and Hellman invented an entirely new type
of cryptography, called public key [Diffie and Hellman 1976][2]. At the heart of this concept is the idea of
using a one-way function for encryption. The most common purposes for which public key cryptography has
been applied are confidential message transmission, authentication, key exchange, coin flip, secret sharing and
zero knowledge proof. There are public key cryptosystems and digital signature systems based on the discrete
logarithm problem (DLP) such as Digital Signature Standard (DSS) [3], ElGamal cryptosystem and Diffie-
Hellman key exchange system. The security of the new cryptosystem is based on DLP [4][5]. The main feature
of the new system is that its public key encryption is computationally equivalent to EIGamal public key
encryption.
II. Public Key Cryptosystem
In this system we take a finite field
Fp x
f x
, where f(x) is a primitive polynomial of degree n will be
considered as the base polynomial of the system [6] [7]. Let α be a root of f(x), k be any random number less
than pn
− 1where k, pn
− 1 = 1and let fk(x) be a primitive polynomial with the root αk
. Let k be the secret
parameter of the system and polynomials f(x) and fk(x) be public polynomials of the system. Using the
algorithm [8] we can compute αk
, then we can express αk
as a polynomial g α . However for a given g α to
find k where αk
= g α is a DLP.
2.1 Encryption For a randomly generated N with n bits we have
xN
≡ T x mod f(x) (1)
and
xN
≡ Tk x modfk(x). (2)
It is easy to show that
Tk x ≡ (T(xk−1
))k
mod fk(x). (3)
or
T(x) ≡ (Tk(xk
))k−1
modf(x) (4)
Where k−1
k ≡ 1 mod (pn
− 1)
Suppose we want to encrypt the message M. We can express the message M as a polynomial M(x) of
degree n overFp. The encryption process is the following:
A public-key cryptosystem based on discrete logarithm problem over finite fields 𝐹 𝑝 𝑛
DOI: 10.9790/5728-11130103 www.iosrjournals.org 2 |Page
{M. T x
−1
, Tk xk
} (5)
or
{M. Tk x
−1
, T xk−1
} (6)
and the encrypted message is a pair as represented in (5) or (6).
2.2 Decryption Using the secret key k, compute either (Tk(xk
))k−1
or (T(xk−1
))k
and can get M by
multiplying the respective element with the first part of the encrypted message.
1. Example
Here p=2 and we take the finite field
F2 x
f x
, where f x = x3
+ x2
+ 1 be the base polynomial of the system and
we will denote by  a root of f(x). Let k = 3 and let f3 x = x3
+ x + 1 be the primitive polynomial with the
root α3
. Let k = 3 be the secret parameter of the system and polynomials f x and f3 x be public polynomials
of the system.
Take N = (101)2 = 5, we have,
x5
≡ (x + 1)mod(x3
+ x2
+ 1) and
x5
≡ (x2
+ x + 1)mod(x3
+ x + 1). Here, T x = x + 1 and T3 x = x2
+ x + 1.
Then,
x2
+ x + 1 ≡ (x5
+ 1)3
mod(x3
+ x + 1) or
x + 1 ≡ (x6
+ x3
+ 1)5
mod(x3
+ x2
+ 1), where 3−1
= 5 (mod7).
Also, T x −1
= x2
or T3 x −1
= x2
+ 1.
Let the message M that needs to be encrypted be represented as a polynomial M x = x3
+ x + 1. Then
compute,
{M(x). T x
−1
, T3 x3
}={x5
+ x3
+ x2
, x6
+ x3
+ 1} (7)
Or
{M(x). T3 x
−1
, T x5
}={x5
+ x2
+ x + 1, x5
+ 1} (8)
The encrypted message is a pair as represented in (7) or (8).
Decryption is based on the fact that only the owner of the system knows the secret number 3 or 5 and
having T3 x = x2
+ x + 1 or T x = x + 1 he can calculate either (T3 x3
)5
or (T x5
)3
and get M by
multiplying the respective results with the first part of the encrypted message.
1. Example
Here p=2 and we take the finite field
F2 x
f x
, where f x = x8
+ x6
+ 1 be the base polynomial of the system and
we will denote by  a root of f(x). Let k = 4 and let f4 x = x4
+ x3
+ 1 be the primitive polynomial with the
root α4
. Let k = 4 be the secret parameter of the system and polynomials f x and f4 x be public polynomials
of the system.
Take N = (11111)2 = 31, we have,
x31
≡ x mod(x8
+ x6
+ 1) and
x31
≡ x mod(x4
+ x3
+ 1). Here, T x = x and T4 x = x.
Then,
x ≡ (x64
)4
mod(x4
+ x3
+ 1) Or
x ≡ (x4
)64
mod(x8
+ x6
+ 1) , where 4−1
= 64 (mod255).
Also, T x −1
= x7
+ x5
or T4 x −1
= x7
+ x5
.
Let the message M that needs to be encrypted be represented as a polynomial M x = x8
+ x7
+ x6
+ x5
+ 1.
Then compute,
{M(x). T x
−1
, T4 x4
}= (x8
+ x7
+ x6
+ x5
+ 1 (x7
+ x5
), x4
} (9)
Or
{M(x). T4 x
−1
, T x64
}={ (x8
+ x7
+ x6
+ x5
+ 1 (x7
+ x5
), x64
} (10)
The encrypted message is a pair as represented in (9) or (10).
Decryption is based on the fact that only the owner of the system knows the secret number 4 or 64 and
having T4 x = x or T x = x he can calculate either (T4 x4
)64
or (T x64
)4
and get M by multiplying the
respective results with the first part of the encrypted message.
A public-key cryptosystem based on discrete logarithm problem over finite fields 𝐹 𝑝 𝑛
DOI: 10.9790/5728-11130103 www.iosrjournals.org 3 |Page
III. Security Of The System
The security of the system is based on the discrete logarithm problem (DLP) over the function
field Fpn . Assuming that α is the root of the base primitive polynomial f(x) and αk
is the root of the primitive
polynomialfk(x). For a given αk
it is quite easy to construct its minimal polynomial fk(x) [8]. For a polynomial
fk(x) its root as a polynomial g(α) can be found using the algorithm presented in [8]. The complexity of the
algorithm is not more than O (t3
). However for a given g(α) to find αk
= g α is a DLP. The decryption process
is difficult when we work in the field of size with prime extension to be equal at least to 2048..
IV. Implementation Aspects Of The System
An encryption operation of this system according to the formulae (5) or (6) is just multiplication. The
encryption or decryption process of this system has the same complexity as for the ElGamal type encryption or
decryption. When comparing decryption operations we can conclude that the system presented here has about
the same complexity compared with both RSA and ElGamal type decryption since both require one regular
exponentiation.
V. Conclusion
In this paper a new public key system which is based on DLP is developed. The complexity of this
system is based on the selection of the Function Field Fpn . In this system the selection of the prime number p
and the exponent n has an important role. All public key operations of the presented system can be implemented
virtually with the same complexity compared with existing systems. The concept used in this system may
useful in the construction of digital signature and the process of hashing.
References
[1]. Lilly P.L, Saju M.I., A method of designing a public-key cryptosystem based on discrete logarithm problem, IRJPA-4(11), 2014,
628-630.
[2]. Diffie W., Helman M.E., New Directions in Cryptography, IEEE Transactions on information theory, Vol. IT-22, Nov.1976, 644-
654.
[3]. Digital Signature Standard, Federal Information Processing Standards Publication 186, May 1994.
[4]. Odlyzko A., Discrete logarithms: The past and the Future; Designs, Codes and Cryptography, (2000), 129-145.
[5]. McCurley K., The discrete logarithm problem, Proceedings of Symposia in Applies Mathematica, Vol.42, 1990, 49-74.
[6]. Lidl, Niederreiter (1997), Finite Fields (2nd ed.), Cambridge University, Press.
[7]. Neal Koblitz, Algebraic Aspects of Cryptography, Springer.
[8]. Taher ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE, Transactions on
Information Theory, Vol. IT-31, n.4, 1985, 469-472, also in CRYPTO 84, 10-18, Springer-Verlag.

More Related Content

PDF
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
PDF
Dsouza
PPT
Cupdf.com public key-cryptography-569692953829a
PDF
50620130101002
PDF
CVPRW2015
PDF
D017433134
PDF
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
DOCX
Senior Research Final Draft3
BLIND SIGNATURE SCHEME BASED ON CHEBYSHEV POLYNOMIALS
Dsouza
Cupdf.com public key-cryptography-569692953829a
50620130101002
CVPRW2015
D017433134
LITTLE DRAGON TWO: AN EFFICIENT MULTIVARIATE PUBLIC KEY CRYPTOSYSTEM
Senior Research Final Draft3

What's hot (17)

PPTX
Rsa cryptosystem
DOCX
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
PDF
A probabilistic data encryption scheme (pdes)
PDF
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
PDF
A cloud security approach for data at rest
PDF
Somewhat Homomorphic Encryption Technique
PDF
Crypto cameraready(1) (2)
PDF
F010243136
PDF
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
PDF
DOC
secure mining of association rules in horizontally distributed databases
PPT
Digital Signature Recognition using RSA Algorithm
PDF
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
PDF
Presentation on Cryptography_Based on IEEE_Paper
PPT
(Crypto) DES And RSA Algorithms Overview
PDF
On deriving the private key from a public key
PDF
Lightweight Cryptography for Distributed PKI Based MANETS
Rsa cryptosystem
RSA - ENCRYPTION ALGORITHM CRYPTOGRAPHY
A probabilistic data encryption scheme (pdes)
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
A cloud security approach for data at rest
Somewhat Homomorphic Encryption Technique
Crypto cameraready(1) (2)
F010243136
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
secure mining of association rules in horizontally distributed databases
Digital Signature Recognition using RSA Algorithm
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Presentation on Cryptography_Based on IEEE_Paper
(Crypto) DES And RSA Algorithms Overview
On deriving the private key from a public key
Lightweight Cryptography for Distributed PKI Based MANETS
Ad

Similar to A Public-Key Cryptosystem Based On Discrete Logarithm Problem over Finite Fields 퐅퐩 퐧 (20)

PPT
Network Security and Cryptography
PPTX
Public key algorithm
PPTX
Shilpa ppt
DOCX
Cloud computing term paper
PDF
Secure Mining of Association Rules in Horizontally Distributed Databases
PPT
ch09_rsa_nemo.ppt
PDF
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
PDF
Cryptosystem An Implementation of RSA Using Verilog
PDF
To allot secrecy-safe association rules mining schema using FP tree
PDF
Nt1330 Unit 4 Dthm Paper
PDF
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
PDF
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
PDF
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
PDF
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
PDF
Elgamal signature for content distribution with network coding
PDF
White Paper on Cryptography
PPTX
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
PPT
PDF
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
PPT
Rsa diffi-network security-itt
Network Security and Cryptography
Public key algorithm
Shilpa ppt
Cloud computing term paper
Secure Mining of Association Rules in Horizontally Distributed Databases
ch09_rsa_nemo.ppt
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
Cryptosystem An Implementation of RSA Using Verilog
To allot secrecy-safe association rules mining schema using FP tree
Nt1330 Unit 4 Dthm Paper
Breaking Mignotte's Sequence Based Secret Sharing Scheme Using SMT Solver
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
THE KEY EXCHANGE CRYPTOSYSTEM USED WITH HIGHER ORDER DIOPHANTINE EQUATIONS
NEW SYMMETRIC ENCRYPTION SYSTEM BASED ON EVOLUTIONARY ALGORITHM
Elgamal signature for content distribution with network coding
White Paper on Cryptography
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
Rsa diffi-network security-itt
Ad

More from IOSR Journals (20)

PDF
A011140104
PDF
M0111397100
PDF
L011138596
PDF
K011138084
PDF
J011137479
PDF
I011136673
PDF
G011134454
PDF
H011135565
PDF
F011134043
PDF
E011133639
PDF
D011132635
PDF
C011131925
PDF
B011130918
PDF
A011130108
PDF
I011125160
PDF
H011124050
PDF
G011123539
PDF
F011123134
PDF
E011122530
PDF
D011121524
A011140104
M0111397100
L011138596
K011138084
J011137479
I011136673
G011134454
H011135565
F011134043
E011133639
D011132635
C011131925
B011130918
A011130108
I011125160
H011124050
G011123539
F011123134
E011122530
D011121524

Recently uploaded (20)

PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
PDF
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
PDF
Sciences of Europe No 170 (2025)
PDF
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
PPTX
neck nodes and dissection types and lymph nodes levels
PDF
AlphaEarth Foundations and the Satellite Embedding dataset
PPTX
Introduction to Cardiovascular system_structure and functions-1
PPTX
Introduction to Fisheries Biotechnology_Lesson 1.pptx
PPTX
7. General Toxicologyfor clinical phrmacy.pptx
PDF
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
PPTX
microscope-Lecturecjchchchchcuvuvhc.pptx
PDF
Biophysics 2.pdffffffffffffffffffffffffff
PPTX
BIOMOLECULES PPT........................
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PPTX
2. Earth - The Living Planet earth and life
PPT
POSITIONING IN OPERATION THEATRE ROOM.ppt
PPTX
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PPTX
Cell Membrane: Structure, Composition & Functions
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
Sciences of Europe No 170 (2025)
Mastering Bioreactors and Media Sterilization: A Complete Guide to Sterile Fe...
neck nodes and dissection types and lymph nodes levels
AlphaEarth Foundations and the Satellite Embedding dataset
Introduction to Cardiovascular system_structure and functions-1
Introduction to Fisheries Biotechnology_Lesson 1.pptx
7. General Toxicologyfor clinical phrmacy.pptx
SEHH2274 Organic Chemistry Notes 1 Structure and Bonding.pdf
microscope-Lecturecjchchchchcuvuvhc.pptx
Biophysics 2.pdffffffffffffffffffffffffff
BIOMOLECULES PPT........................
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
2. Earth - The Living Planet earth and life
POSITIONING IN OPERATION THEATRE ROOM.ppt
ANEMIA WITH LEUKOPENIA MDS 07_25.pptx htggtftgt fredrctvg
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
Cell Membrane: Structure, Composition & Functions

A Public-Key Cryptosystem Based On Discrete Logarithm Problem over Finite Fields 퐅퐩 퐧

  • 1. IOSR Journal of Mathematics (IOSR-JM) e-ISSN: 2278-5728, p-ISSN: 2319-765X. Volume 11, Issue 1 Ver. III (Jan - Feb. 2015), PP 01-03 www.iosrjournals.org DOI: 10.9790/5728-11130103 www.iosrjournals.org 1 |Page A Public-Key Cryptosystem Based On Discrete Logarithm Problem over Finite Fields 𝐅𝐩 𝐧 Saju M I1 , Lilly P L2 1Assistant Professor, Department of Mathematics, St. Thomas’ College, Thrissur, India 2Associate professor, Department of Mathematics, St. Joseph’s College, Irinjalakuda, India Abstract: One of the classical problems in mathematics is the Discrete Logarithm Problem (DLP).The difficulty and complexity for solving DLP is used in most of the cryptosystems. In this paper we design a public key system based on the ring of polynomials over the field 𝐹𝑝 is developed. The security of the system is based on the difficulty of finding discrete logarithms over the function field 𝐹 𝑝 𝑛 with suitable prime p and sufficiently large n. The presented system has all features of ordinary public key cryptosystem. Keywords: Discrete logarithm problem, Function Field, Polynomials over finite fields, Primitive polynomial, Public key cryptosystem. I. Introduction For the construction of a public key cryptosystem, we need a finite extension field Fpn overFp. In our paper [1] we design a public key cryptosystem based on discrete logarithm problem over the field F2. Here, for increasing the complexity and difficulty for solving DLP, we made a proper additional modification in the system. A cryptosystem for message transmission means a map from units of ordinary text called plaintext message units to units of coded text called cipher text message units. The face of cryptography was radically altered when Diffie and Hellman invented an entirely new type of cryptography, called public key [Diffie and Hellman 1976][2]. At the heart of this concept is the idea of using a one-way function for encryption. The most common purposes for which public key cryptography has been applied are confidential message transmission, authentication, key exchange, coin flip, secret sharing and zero knowledge proof. There are public key cryptosystems and digital signature systems based on the discrete logarithm problem (DLP) such as Digital Signature Standard (DSS) [3], ElGamal cryptosystem and Diffie- Hellman key exchange system. The security of the new cryptosystem is based on DLP [4][5]. The main feature of the new system is that its public key encryption is computationally equivalent to EIGamal public key encryption. II. Public Key Cryptosystem In this system we take a finite field Fp x f x , where f(x) is a primitive polynomial of degree n will be considered as the base polynomial of the system [6] [7]. Let α be a root of f(x), k be any random number less than pn − 1where k, pn − 1 = 1and let fk(x) be a primitive polynomial with the root αk . Let k be the secret parameter of the system and polynomials f(x) and fk(x) be public polynomials of the system. Using the algorithm [8] we can compute αk , then we can express αk as a polynomial g α . However for a given g α to find k where αk = g α is a DLP. 2.1 Encryption For a randomly generated N with n bits we have xN ≡ T x mod f(x) (1) and xN ≡ Tk x modfk(x). (2) It is easy to show that Tk x ≡ (T(xk−1 ))k mod fk(x). (3) or T(x) ≡ (Tk(xk ))k−1 modf(x) (4) Where k−1 k ≡ 1 mod (pn − 1) Suppose we want to encrypt the message M. We can express the message M as a polynomial M(x) of degree n overFp. The encryption process is the following:
  • 2. A public-key cryptosystem based on discrete logarithm problem over finite fields 𝐹 𝑝 𝑛 DOI: 10.9790/5728-11130103 www.iosrjournals.org 2 |Page {M. T x −1 , Tk xk } (5) or {M. Tk x −1 , T xk−1 } (6) and the encrypted message is a pair as represented in (5) or (6). 2.2 Decryption Using the secret key k, compute either (Tk(xk ))k−1 or (T(xk−1 ))k and can get M by multiplying the respective element with the first part of the encrypted message. 1. Example Here p=2 and we take the finite field F2 x f x , where f x = x3 + x2 + 1 be the base polynomial of the system and we will denote by  a root of f(x). Let k = 3 and let f3 x = x3 + x + 1 be the primitive polynomial with the root α3 . Let k = 3 be the secret parameter of the system and polynomials f x and f3 x be public polynomials of the system. Take N = (101)2 = 5, we have, x5 ≡ (x + 1)mod(x3 + x2 + 1) and x5 ≡ (x2 + x + 1)mod(x3 + x + 1). Here, T x = x + 1 and T3 x = x2 + x + 1. Then, x2 + x + 1 ≡ (x5 + 1)3 mod(x3 + x + 1) or x + 1 ≡ (x6 + x3 + 1)5 mod(x3 + x2 + 1), where 3−1 = 5 (mod7). Also, T x −1 = x2 or T3 x −1 = x2 + 1. Let the message M that needs to be encrypted be represented as a polynomial M x = x3 + x + 1. Then compute, {M(x). T x −1 , T3 x3 }={x5 + x3 + x2 , x6 + x3 + 1} (7) Or {M(x). T3 x −1 , T x5 }={x5 + x2 + x + 1, x5 + 1} (8) The encrypted message is a pair as represented in (7) or (8). Decryption is based on the fact that only the owner of the system knows the secret number 3 or 5 and having T3 x = x2 + x + 1 or T x = x + 1 he can calculate either (T3 x3 )5 or (T x5 )3 and get M by multiplying the respective results with the first part of the encrypted message. 1. Example Here p=2 and we take the finite field F2 x f x , where f x = x8 + x6 + 1 be the base polynomial of the system and we will denote by  a root of f(x). Let k = 4 and let f4 x = x4 + x3 + 1 be the primitive polynomial with the root α4 . Let k = 4 be the secret parameter of the system and polynomials f x and f4 x be public polynomials of the system. Take N = (11111)2 = 31, we have, x31 ≡ x mod(x8 + x6 + 1) and x31 ≡ x mod(x4 + x3 + 1). Here, T x = x and T4 x = x. Then, x ≡ (x64 )4 mod(x4 + x3 + 1) Or x ≡ (x4 )64 mod(x8 + x6 + 1) , where 4−1 = 64 (mod255). Also, T x −1 = x7 + x5 or T4 x −1 = x7 + x5 . Let the message M that needs to be encrypted be represented as a polynomial M x = x8 + x7 + x6 + x5 + 1. Then compute, {M(x). T x −1 , T4 x4 }= (x8 + x7 + x6 + x5 + 1 (x7 + x5 ), x4 } (9) Or {M(x). T4 x −1 , T x64 }={ (x8 + x7 + x6 + x5 + 1 (x7 + x5 ), x64 } (10) The encrypted message is a pair as represented in (9) or (10). Decryption is based on the fact that only the owner of the system knows the secret number 4 or 64 and having T4 x = x or T x = x he can calculate either (T4 x4 )64 or (T x64 )4 and get M by multiplying the respective results with the first part of the encrypted message.
  • 3. A public-key cryptosystem based on discrete logarithm problem over finite fields 𝐹 𝑝 𝑛 DOI: 10.9790/5728-11130103 www.iosrjournals.org 3 |Page III. Security Of The System The security of the system is based on the discrete logarithm problem (DLP) over the function field Fpn . Assuming that α is the root of the base primitive polynomial f(x) and αk is the root of the primitive polynomialfk(x). For a given αk it is quite easy to construct its minimal polynomial fk(x) [8]. For a polynomial fk(x) its root as a polynomial g(α) can be found using the algorithm presented in [8]. The complexity of the algorithm is not more than O (t3 ). However for a given g(α) to find αk = g α is a DLP. The decryption process is difficult when we work in the field of size with prime extension to be equal at least to 2048.. IV. Implementation Aspects Of The System An encryption operation of this system according to the formulae (5) or (6) is just multiplication. The encryption or decryption process of this system has the same complexity as for the ElGamal type encryption or decryption. When comparing decryption operations we can conclude that the system presented here has about the same complexity compared with both RSA and ElGamal type decryption since both require one regular exponentiation. V. Conclusion In this paper a new public key system which is based on DLP is developed. The complexity of this system is based on the selection of the Function Field Fpn . In this system the selection of the prime number p and the exponent n has an important role. All public key operations of the presented system can be implemented virtually with the same complexity compared with existing systems. The concept used in this system may useful in the construction of digital signature and the process of hashing. References [1]. Lilly P.L, Saju M.I., A method of designing a public-key cryptosystem based on discrete logarithm problem, IRJPA-4(11), 2014, 628-630. [2]. Diffie W., Helman M.E., New Directions in Cryptography, IEEE Transactions on information theory, Vol. IT-22, Nov.1976, 644- 654. [3]. Digital Signature Standard, Federal Information Processing Standards Publication 186, May 1994. [4]. Odlyzko A., Discrete logarithms: The past and the Future; Designs, Codes and Cryptography, (2000), 129-145. [5]. McCurley K., The discrete logarithm problem, Proceedings of Symposia in Applies Mathematica, Vol.42, 1990, 49-74. [6]. Lidl, Niederreiter (1997), Finite Fields (2nd ed.), Cambridge University, Press. [7]. Neal Koblitz, Algebraic Aspects of Cryptography, Springer. [8]. Taher ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms, IEEE, Transactions on Information Theory, Vol. IT-31, n.4, 1985, 469-472, also in CRYPTO 84, 10-18, Springer-Verlag.