# An M^{3} Public-Key Encryption Scheme

Conference paper

First Online:

## Abstract

It is well known that the RSA public-key cryptosystem can be broken if the composite modulus can be factored. It is nor known, however, whether the problem of breaking any RSA system is equivalent in difficulty to factoring the modulus. In 1979 Rabin [5] introduced a public-key cryptosystem which is as difficult to break as it is to factor a modulus R=p and 0 < K < R, then transmit K to the designer.

_{1}p_{2}, where p_{1}p_{2}are two distinct large primes. Esaentially Rabin suggested that the designer of such a scheme first determine p_{1}and p_{2}, keep them secret and make R public. Anyone wishing to send a secure message H (0 < M < R ) to the designer would encrypt M as K , where$$
K \equiv M^2 (\bmod R)$$

## Keywords

Chinese Remainder Theorem Secure Message Linear Congruence Jacobi Symbol Primitive Cube Root
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Download
to read the full conference paper text

## References

- [1]R.A. Demillo, G.I. Davida, D.P. Dobkin, M.A. Harrison, and R.J. Lipton,
**On the Safety of Cryptosystems**, Applied Cryptology, Cryptographic Protocols and Computer Security Models, AMS Short Courses Lecture Notes, Vol. 29, Providence, 1983.Google Scholar - [2]Shafi Goldwasser, Silvio Micali, R.L. Rivest,
**A “paradoxical” solution to the signature problem**, Proc. 25th IEEE Symposium on Foundations of Computer Science, to appear.Google Scholar - [3]D.H. Lehmer,
**Computer technology applied to the theory of numbers**, Studies in Number Theory, Math. Assoc. of America, 1969, Theorem 5, p. 133.Google Scholar - [4]H.W. Lenstra, jr.,
**Euclidean number fields I.**, Math. Intelligencer 2 (1979/80), 6–15.MathSciNetCrossRefGoogle Scholar - [5]M.O. Rabin,
**Digitized signatures and public-key functions as intractable as factorization**, M.I.T. Lab. for Computer Science, Tech. Rep. LCS/TR212, 1979.Google Scholar - [6]Rene Schoof,
**Elliptic curves over finite fields and the computation of square roots mod p**, Math. Comp. 44 (1985), 483–494.zbMATHCrossRefMathSciNetGoogle Scholar - [7]D. Shanks,
**Five number theoretic algorithms**, Congressus Numerantium 7 (1973), 51–69.MathSciNetGoogle Scholar - [8]Peter Wilker,
**An effecient algorithmic solution of the diophantine equation u**^{2}**+ 5v**^{2}=**m**, Math. Comp. 35 (1980), 1347–1352.zbMATHCrossRefMathSciNetGoogle Scholar - [9]H.C. Williams and R. Holte,
**Computation of the solution of x**^{3}**+ Dy**^{3}**= 1**, Math. Comp. 31 (1977), 778–785.zbMATHCrossRefMathSciNetGoogle Scholar - [10]H.C. Williams,
**A modification of the RSA public-key enryption procedure**, IEEE Transactions on Information Theory, IT-26 (1980), 726–729.CrossRefGoogle Scholar

## Copyright information

© Springer-Verlag Berlin Heidelberg 1986