Two RSA-based Cryptosystems

A. Telveenus
2024-05-18
Abstract:The cryptosystem RSA is a very popular cryptosystem in the study of Cryptography. In this article, we explore how the idea of a primitive mth root of unity in a ring can be integrated into the Discrete Fourier Transform, leading to the development of new cryptosystems known as RSA-DFT and RSA-HGR.
Cryptography and Security
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? The main objective of this paper is to explore how to combine the concept of the m -th primitive root of unity with the Discrete Fourier Transform (DFT) to develop two new RSA - based cryptosystems: RSA - DFT and RSA - HGR. Specifically, the paper attempts to solve the following problems: 1. **Improve the security of the existing RSA algorithm**: - The paper proposes to enhance the security of the RSA algorithm by introducing the concepts of the m -th primitive root of unity and the Halidon ring. The traditional RSA algorithm relies on the difficulty of factoring large integers, while the newly proposed cryptosystems combine the properties of the discrete Fourier transform and the Halidon ring, increasing the difficulty for attackers to break. 2. **Develop new encryption mechanisms**: - The RSA - DFT cryptosystem uses the discrete Fourier transform as a key tool for encryption and decryption, providing an encryption method different from the traditional RSA. - The RSA - HGR cryptosystem is based on the Halidon group ring (HGR), further expanding the complexity and security of the encryption mechanism. 3. **Improve encryption efficiency**: - By combining the characteristics of the discrete Fourier transform and the Halidon ring, the paper attempts to improve the efficiency of the encryption and decryption processes, especially when dealing with large - scale data. 4. **Counter potential attack methods**: - The paper discusses five possible attack methods against the RSA algorithm and proposes corresponding defense measures. For example, methods such as using a large key space, constant exponentiation time, random delay, and blinding are used to resist brute - force attacks and timing attacks. ### Formula summary - **The m -th primitive root of unity**: \[ \omega^m = 1, \quad \sum_{r = 0}^{m - 1}\omega^{r(i - j)}= \begin{cases} m & \text{if } i\equiv j\pmod{m}\\ 0 & \text{if } i\not\equiv j\pmod{m} \end{cases} \] - **Discrete Fourier Transform (DFT)**: \[ \text{DFT}_\omega(f(x))=(f_0(1), f_1(\omega), f_2(\omega^2), \ldots, f_{m - 1}(\omega^{m - 1})) \] - **Inverse Discrete Fourier Transform (IDFT)**: \[ \text{DFT}^{-1}_\omega(f(x))=\frac{1}{m}\text{DFT}_{\omega^{-1}}(f(x)) \] - **Definition of Halidon ring**: - Let \(R\) be a ring with a unity element. If there exists an m -th primitive root of unity \(\omega\), and \(m\) is invertible in \(R\), then \(R\) is called a Halidon ring with index \(m\). Through these formulas and concepts, the paper constructs new RSA - DFT and RSA - HGR cryptosystems, aiming to provide more secure and efficient encryption solutions.