Skip to main content
Log in

The Cubic Public-Key Transformation

  • Published:
Circuits, Systems & Signal Processing Aims and scope Submit manuscript

Abstract

This note proposes the use of the cubic transformation for public-key applications and random event and number generation, in a manner akin to the Rabin cipher. Transformations modulo a prime p or a composite n = pq, where p and q are primes, are so used that each transformed value has only three roots. Such a transformation, together with additional tag information, makes it possible to uniquely invert each transformed value. The effectiveness of the method as a random number generator (used in a variant with nine roots) comes from the fact that the cryptanalyst must contend with a ninefold branching at each step.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhash Kak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kak, S. The Cubic Public-Key Transformation. Circuits Syst Signal Process 26, 353–359 (2007). https://doi.org/10.1007/s00034-006-0309-x

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00034-006-0309-x

Keywords

Navigation