Abstract
A Maple implementation of the Chor-Rivest cryptosystem is presented. The main problems in this implementation are: to determine discrete logarithms over GF(q h), q≈ 200 and h ≈ 25, and to use the arithmetic of the finite fields in order to encrypt and decrypt messages.
Chapter PDF
Similar content being viewed by others
References
Chor, B.: Two issues in public key cryptography. RSA bit security and a new knapsack type system. The MIT Press, Cambridge (1985)
Chor, B., Rivest, R.L.: A knapsack-type public key cryptosystem based on aritmethic in finite fields. IEEE Trans. Inform. Theory 34(5), 901–909 (1988)
Cover, T.M.: Enumerative source encoding. IEEE Trans. Inform. Theory 19, 73–77 (1973)
Diffie, W., Hellman, M.E.: New directions in Cryptography. IEEE Trans. Inform. Theory 22, 644–654 (1976)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithm. IEEE Trans. Inform. Theory 31, 469–472 (1985)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)
Mollin, R.A.: An introduction to cryptography. Chapman & Hall/CRC (2001)
Pohlig, R.C., Hellman, M.E.: An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans. Inform. Theory 24, 106–110 (1978)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978)
Shamir, A.: A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Trans. Inform. Theory 30(5), 699–704 (1984)
Schirokauer, O., Weber, D., Denny, T.: Discrete logarithms: The effectiveness of the index calculus method. In: Cohen, H. (ed.) ANTS 1996. LNCS, vol. 1122, pp. 337–361. Springer, Berlin (1996)
Vaudenay, S.: Cryptanalysis of the Chor-Rivest cryptosystem. J. Cryptology 14, 87–100 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Encinas, L.H., Masqué, J.M., Dios, A.Q. (2006). Maple Implementation of the Chor-Rivest Cryptosystem. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds) Computational Science – ICCS 2006. ICCS 2006. Lecture Notes in Computer Science, vol 3992. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11758525_59
Download citation
DOI: https://doi.org/10.1007/11758525_59
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34381-3
Online ISBN: 978-3-540-34382-0
eBook Packages: Computer ScienceComputer Science (R0)