Skip to main content
Log in

Cryptanalysis of Rédei- and Dickson permutations on arbitrary finite rings

  • Published:
Applicable Algebra in Engineering, Communication and Computing Aims and scope

Abstract

In the RSA public-key cryptosystem the encryption function is a permutation on the residue class ringℤ/Nℤ induced by some polynomialX k ∈(ℤ/Nℤ) [X], whereN is the product of two large primes. Variants of the RSA-scheme can be obtained, if this permutation is replaced by different types of rational permutations onℤ/Nℤ. A more general approach is the use of arbitrary finite rings instead of residue class rings in cryptography. Since the message space is finite, in either case cryptanalysis can be effected by superenciphering. A serious weakness of those PKCs is the existence of a large number of fixedpoints. But even if there are only few fixedpoints in the message space, the elements of considerable small cyclelength are much inconvenient. Anyway an analysis of the minimal cyclelength, i.e. the minimum of cyclelengths of elements different from fixedpoints, is necessary.

In this paper such an analysis will be carried out in the case of Rédei- and Dickson permutations on arbitrary finite rings. The results obtained provide a good basis to construct secure PKCs with best protection against superenciphering. Some of the problems and results in the special cases of finite fields and residue class rings have been stated earlier in the literature (see references).

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Bateman, P. T., Horn, R. A.: A heuristic asymptotic formula concerning the distribution of prime numbers. Math. Comp.16, 363–367 (1962)

    Google Scholar 

  2. Heider, F. P., Kraus, D., Welschenbach, M.: Mathematische Methoden der Kryptoanalyse. Vieweg, Braunschweig 1985

    Google Scholar 

  3. Lausch, H., Müller, W. B., Nöbauer, W.: Über die Struktur einer durch Dicksonpolynome dargestellten Permutationsgruppe des Restklassenringes modulon. J. Reine Angew. Math.261, 88–99 (1973)

    Google Scholar 

  4. Lenstra, H. W. jr.: Factoring integers with elliptic curves. Rep. 86-18, Universiteit van Amsterdam 1986

  5. Lidl, R., Niederreiter, H.: Finite fields. Addison-Wesley, Reading, Mass. 1983

    Google Scholar 

  6. McDonald, B. R.: Finite rings with identity. Marcel Dekker, New York 1974

    Google Scholar 

  7. Müller, W. B.: Über eine Klasse von durch Dickson-Polynome dargestellten Gruppen. Colloq. Math. Soc. Janos Bolyai6, 361–376 (1971)

    Google Scholar 

  8. Müller, W. B., Nöbauer, R.: Cryptanalysis of the Dickson-Scheme. Lecture Notes in Comp. Science, vol. 219, pp. 50–61. Berlin, Heidelberg, New York: Springer 1985

    Google Scholar 

  9. Müller, W. B., Nöbauer, W.: Über die Fixpunkte der Potenzpermutationen. Sitzungsber. Öster. Akad. d. Wiss. math.-nat. Kl, Abt. II,192, 93–97 (1983)

    Google Scholar 

  10. Nöbauer, R.: Über die Fixpunkte einer Klasse von Dickson-Permutationen. Sitzungsber. Öster. Akad. d. Wiss. math.-nat. Kl., Abt. II,193, 521–547 (1984)

    Google Scholar 

  11. Nöbauer, R.: Cryptanalysis of the Rédei-Scheme. Contributions to General Algebra 3, Hölder-Pichler-Tempsky, Wien 1985, pp. 255–264

    Google Scholar 

  12. Nöbauer, R.: Über die Fixpunkte von durch Dickson-Polynome dargestellten Permutationen. Acta Arithmetica45, 173–181 (1985)

    Google Scholar 

  13. Nöbauer, R.: Rédei-Funktionen und ihre Anwendung in der Kryptographie. Acta Sci. Math.50, 287–298 (1986)

    Google Scholar 

  14. Nöbauer, R.: Rédei-Permutationen endlicher Körper. Contributions to General Algebra 5, Hölder-Pichler-Tempsky, Wien 1987, pp. 235–246

    Google Scholar 

  15. Nöbauer, W.: Über eine Gruppe der Zahlentheorie. Monatshefte Math.58, 181–192 (1954)

    Google Scholar 

  16. Nöbauer, W.: Über Permutationspolynome und Permutations funktionen für Primzahlpotenzen. Monatshefte Math.69, 230–238 (1965)

    Google Scholar 

  17. Nöbauer, W.: Über eine Klasse von Permutationspolynomen und die dadurch dargestellten Gruppen. J. Reine Angew. Math.231, 215–219 (1968)

    Google Scholar 

  18. Nöbauer, W.: Über Gruppen von Dickson-Polynomfunktionen und einige damit zusammenhangende zahlentheoretische Fragen. Monatshefte Math.77, 330–334 (1973)

    Google Scholar 

  19. Nöbauer, W.: Über die Fixpunkte der Dickson-Permutationen. Sitzungsber. Öster. Akad. d. Wiss. math.-nat. Kl., Abt. II,193, 115–133 (1984)

    Google Scholar 

  20. Nöbauer, W.: Über die Zyklenlänge der Rédei-Permutationen. Anzeiger d. Öster. Akad. d. Wiss. math.-nat. Kl.,121, 121–123 (1984)

    Google Scholar 

  21. Nöbauer, W.: On the length of cycles of polynomial permutations. Contributions to General Algebra 3, Hölder-Pichler-Tempsky, Wien 1985, pp. 267–274

    Google Scholar 

  22. Nöbauer, W.: Rédei-Funktionen für Zweierpotenzen. Periodica Math. Hungar.17(1), 37–44 (1986)

    Google Scholar 

  23. Pieper, R.: Kryptoanalytische Untersuchungen rationaler Permutationen von kommutativen unitären Ringen. Dissertation, Universität Dortmund 1990

  24. Pollard, J. M.: Theorems on factorization and primality testing. Proc. Cambridge Philos. Soc.76, 521–528 (1974)

    Google Scholar 

  25. Rédei, L.: Algebra I. Pergamon Press, Oxford 1967

    Google Scholar 

  26. Riesl, H.: Prime numbers and computer methods for factorization. Birkhäuser-Verlag, Boston 1985

    Google Scholar 

  27. Simmons, G.J., Norris, M. J.: Preliminary comments on the M.I.T. public-key cryptosystem. Cryptologia1, 409–418 (1977)

    Google Scholar 

  28. Williams, H. C.: Ap + 1 method of factoring. Math. Comp.39(159), 225–234 (1982)

    Google Scholar 

  29. Williams, H. C., Schmid, B.: Some remarks concerning the M.I.T. public-key cryptosystem. BIT19, 525–538 (1979)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

In this paper ring will always mean commutative unitary ring.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Pieper, R. Cryptanalysis of Rédei- and Dickson permutations on arbitrary finite rings. AAECC 4, 59–76 (1993). https://doi.org/10.1007/BF01270400

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01270400

Key words

Navigation