Advertisement

NICE - New Ideal Coset Encryption -

  • Michael Hartmann
  • Sachar Paulus
  • Tsuyoshi Takagi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1717)

Abstract

Recently, a novel public-key cryptosystem constructed on number fields is presented. The prominent theoretical property of the public-key cryptosystem is a quadratic decryption bit complexity of the public key, which consists of only simple fast arithmetical operations. We call the cryptosystem NICE (New Ideal Coset Encryption). In this paper, we consider practical aspects of the NICE cryptosystem. Our implementation in software shows that the decryption time of NICE is comparably as fast as the encryption time of the RSA cryptosystem with e = 216+1. To show if existing smart cards can be used, we implemented the NICE cryptosystem using a smart card designed for the RSA cryptosystem. Our result shows that the decryption time of NICE is comparably as fast as the decryption time of RSA cryptosystem but not so fast as in software implementation. We discuss the reasons for this and indicate requirements for smartcard designers to achieve fast implementation on smartcards.

Key words

public-key cryptosystem fast decryption quadratic order smart card implementation 

References

  1. 1.
    L. M. Adleman and K. S. McCurley, “Open problems in number theoretic complexity, II” proceedings of ANTS-I, LNCS 877, (1994), pp.291–322.Google Scholar
  2. 2.
    I. Biehl, J. Buchmann, and T. Papanikolaou. LiDIA-A library for computational number theory. The LiDIA Group, Universität des Saarlandes, Saarbrücken, Germany, 1995.zbMATHGoogle Scholar
  3. 3.
    I. Biehl and J. Buchmann; “An analysis of the reduction algorithms for binary quadratic forms,” Technical Report No. TI-26/97, Technische Universität Darmstadt, (1997).Google Scholar
  4. 4.
    I. Biehl and S. Paulus and T. Takagi, “Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders,” in preparation.Google Scholar
  5. 5.
    J. Buchmann and H. C. Williams; “A key-exchange system based on imaginary quadratic fields,” Journal of Cryptology, 1, (1988), pp.107–118.zbMATHCrossRefMathSciNetGoogle Scholar
  6. 6.
    J. Buchmann and H. C. Williams; “Quadratic fields and cryptography,” London Math. Soc. Lecture Note Series 154, (1990), pp.9–26.Google Scholar
  7. 7.
    J. Buchmann, S. Düllmann, and H. C. Williams. On the complexity and efficiency of a new key exchange system. In Advances in Cryptology-EUROCRYPT’ 89, volume 434 of Lecture Notes in Computer Science, pages 597–616, 1990.Google Scholar
  8. 8.
    J. Cowie, B. Dodson, R. Elkenbracht-Huizing, A. K. Lenstra, P. L. Montgomery, J. Zayer; “A world wide number field sieve factoring record: on to 512 bits,” Advances in Cryptology-ASIACRYPT’ 96, LNCS 1163, (1996), pp.382–394.CrossRefGoogle Scholar
  9. 9.
    D. A. Cox: Primes of the form x 2 + ny2, John Wiley & Sons, New York, 1989Google Scholar
  10. 10.
    W. Diffie and M. Hellman, “New direction in cryptography,” IEEE Transactions on Information Theory, 22, (1976), pp.472–492.CrossRefMathSciNetGoogle Scholar
  11. 11.
  12. 12.
    T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithm in GF(p),” IEEE Transactions on Information Theory, 31, (1985), pp.469–472.zbMATHCrossRefMathSciNetGoogle Scholar
  13. 13.
    D. Hühnlein, M. J. Jacobson, Jr., S. Paulus, and T. Takagi; “A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption,” Advances in Cryptology-EUROCRYPT’ 98, LNCS 1403, (1998), pp.294–307.CrossRefGoogle Scholar
  14. 14.
    H. W. Lenstra, Jr., “Factoring integers with elliptic curves”, Annals of Mathematics, 126, (1987), pp.649–673.CrossRefMathSciNetGoogle Scholar
  15. 15.
    A. K. Lenstra and H. W. Lenstra, Jr. (Eds.), The development of the number field sieve. Lecture Notes in Mathematics, 1554, Springer, (1991).Google Scholar
  16. 16.
    A. J. Menezes, P. van Oorschot, S. Vastone: Handbook of applied crytpography. CRC Press, 1996.Google Scholar
  17. 17.
    T. Okamoto and S. Uchiyama, “A new public-key cryptosystem as secure as factoring,” Advances in Cryptology-EUROCRYPT’ 98, LNCS 1403, (1998), pp.308–318.CrossRefGoogle Scholar
  18. 18.
    S. Paulus and T. Takagi, “A new public-key cryptosystem over the quadratic order with quadratic decryption time,” to appear in Journal of Cryptology.Google Scholar
  19. 19.
    S. Paulus and T. Takagi, “A generalization of the Diffie-Hellman problem based on the coset problem allowing fast decryption,” Proceedings of ICISC’98, Seoul, Korea, 1998.Google Scholar
  20. 20.
    R. Peralta and E. Okamoto, “Faster factoring of integers of a special form,” IEICE Trans. Fundamentals, Vol.E79-A, No.4, (1996), pp.489–493.Google Scholar
  21. 21.
    R. J. Schoof: Quadratic Fields and Factorization. In: H.W. Lenstra, R. Tijdeman, (eds.): Computational Methods in Number Theory. Math. Centrum Tracts 155. Part II. Amsterdam, 1983. pp. 235–286.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1999

Authors and Affiliations

  • Michael Hartmann
    • 1
  • Sachar Paulus
    • 2
  • Tsuyoshi Takagi
    • 3
  1. 1.Darmstadt University of TechnologyDarmstadtGermany
  2. 2.SECUDE Sicherheitstechnologie Informationssysteme GmbHDarmstadtGermany
  3. 3.NTT Information Sharing Platform LaboratoriesDüsseldorfGermany

Personalised recommendations