{"title":"Deterministic Rabin Cryptosystem Using Cubic Congruence and Chinese Remainder Theorem","authors":"Maroti Deshmukh, Kanchan Bisht, Arjun Singh Rawat","doi":"10.1007/s11277-024-11416-5","DOIUrl":null,"url":null,"abstract":"<p>The Rabin Cryptosystem is a public-key cryptosystem known for providing security levels comparable to RSA but with reduced computational overhead. Despite these advantages, it has not been widely adopted for practical use due to its lack of a deterministic nature. This paper addresses this limitation by introducing a new Deterministic Rabin Cryptosystem (DRCS). The DRCS framework includes processes for key generation, encryption, and decryption, leveraging the concept of cubic congruence and the Chinese Remainder Theorem to ensure the decryption process is unambiguous and deterministic. This design not only retains the computational efficiency of the original Rabin Cryptosystem but also enhances its security. Our comparative analysis shows that the DRCS achieves similar performance to the traditional Rabin system in terms of computational overhead. While the encryption process in DRCS is less demanding, its decryption process is more complex, and overall, it maintains a polynomial time complexity. Furthermore, a detailed security analysis indicates that the DRCS is significantly harder to factorize compared to previous models, underscoring its improved security features.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"10 1","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Wireless Personal Communications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s11277-024-11416-5","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"TELECOMMUNICATIONS","Score":null,"Total":0}
引用次数: 0
Abstract
The Rabin Cryptosystem is a public-key cryptosystem known for providing security levels comparable to RSA but with reduced computational overhead. Despite these advantages, it has not been widely adopted for practical use due to its lack of a deterministic nature. This paper addresses this limitation by introducing a new Deterministic Rabin Cryptosystem (DRCS). The DRCS framework includes processes for key generation, encryption, and decryption, leveraging the concept of cubic congruence and the Chinese Remainder Theorem to ensure the decryption process is unambiguous and deterministic. This design not only retains the computational efficiency of the original Rabin Cryptosystem but also enhances its security. Our comparative analysis shows that the DRCS achieves similar performance to the traditional Rabin system in terms of computational overhead. While the encryption process in DRCS is less demanding, its decryption process is more complex, and overall, it maintains a polynomial time complexity. Furthermore, a detailed security analysis indicates that the DRCS is significantly harder to factorize compared to previous models, underscoring its improved security features.
期刊介绍:
The Journal on Mobile Communication and Computing ...
Publishes tutorial, survey, and original research papers addressing mobile communications and computing;
Investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia;
Explores propagation, system models, speech and image coding, multiple access techniques, protocols, performance evaluation, radio local area networks, and networking and architectures, etc.;
98% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again.
Wireless Personal Communications is an archival, peer reviewed, scientific and technical journal addressing mobile communications and computing. It investigates theoretical, engineering, and experimental aspects of radio communications, voice, data, images, and multimedia. A partial list of topics included in the journal is: propagation, system models, speech and image coding, multiple access techniques, protocols performance evaluation, radio local area networks, and networking and architectures.
In addition to the above mentioned areas, the journal also accepts papers that deal with interdisciplinary aspects of wireless communications along with: big data and analytics, business and economy, society, and the environment.
The journal features five principal types of papers: full technical papers, short papers, technical aspects of policy and standardization, letters offering new research thoughts and experimental ideas, and invited papers on important and emerging topics authored by renowned experts.