Efficiency analysis for public key systems based on fractal functions.
In the last decade, dynamical systems were utilized to develop cryptosystems, which ushered the era of continuous value cryptography that transformed the practical region from finite field to real numbers. Approach: Taking the security threats and privacy issues into consideration, fractals function...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English English |
Published: |
Science Publications
2011
|
Online Access: | http://psasir.upm.edu.my/id/eprint/25175/1/Efficiency%20analysis%20for%20public%20key%20systems%20based%20on%20fractal%20functions.pdf http://psasir.upm.edu.my/id/eprint/25175/ http://www.thescipub.com/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Putra Malaysia |
Language: | English English |
id |
my.upm.eprints.25175 |
---|---|
record_format |
eprints |
spelling |
my.upm.eprints.251752015-10-19T23:33:30Z http://psasir.upm.edu.my/id/eprint/25175/ Efficiency analysis for public key systems based on fractal functions. M. G. AL-Saidi, Nadia Md. Said, Mohamad Rushdan M. Ahmed, Adil In the last decade, dynamical systems were utilized to develop cryptosystems, which ushered the era of continuous value cryptography that transformed the practical region from finite field to real numbers. Approach: Taking the security threats and privacy issues into consideration, fractals functions were incorporated into public-key cryptosystem due to their complicated mathematical structure and deterministic nature that meet the cryptographic requirements. In this study we propose a new public key cryptosystem based on Iterated Function Systems (IFS). Results: In the proposed protocol, the attractor of the IFS is used to obtain public key from private one, which is then used with the attractor again to encrypt and decrypt the messages. By exchanging the generated public keys using one of the well known key exchange protocols, both parties can calculate a unique shared key. This is used as a number of iteration to generate the fractal attractor and mask the Hutchinson operator, so that, the known attacks will not work anymore. The algorithm is implemented and compared to the classical one, to verify its efficiency and security. We conclude that public key systems based on IFS transformation perform more efficiently than RSA cryptosystems in terms of key size and key space. Science Publications 2011 Article PeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/25175/1/Efficiency%20analysis%20for%20public%20key%20systems%20based%20on%20fractal%20functions.pdf M. G. AL-Saidi, Nadia and Md. Said, Mohamad Rushdan and M. Ahmed, Adil (2011) Efficiency analysis for public key systems based on fractal functions. Journal of Computer Science, 7 (4). pp. 526-532. ISSN 1549-3636 http://www.thescipub.com/ 10.3844/jcssp.2011.526.532 English |
institution |
Universiti Putra Malaysia |
building |
UPM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Putra Malaysia |
content_source |
UPM Institutional Repository |
url_provider |
http://psasir.upm.edu.my/ |
language |
English English |
description |
In the last decade, dynamical systems were utilized to develop cryptosystems, which ushered the era of continuous value cryptography that transformed the practical region from finite field to real numbers. Approach: Taking the security threats and privacy issues into consideration, fractals functions were incorporated into public-key cryptosystem due to their complicated mathematical structure and deterministic nature that meet the cryptographic requirements. In this study we propose a new public key cryptosystem based on Iterated Function Systems (IFS). Results: In the proposed protocol, the attractor of the IFS is used to obtain public key from private one, which is then used with the attractor again to encrypt and decrypt the messages. By exchanging the generated public keys using one of the well known key exchange protocols, both parties can calculate a unique shared key. This is used as a number of iteration to generate the fractal attractor and mask the Hutchinson operator, so that, the known attacks will not work anymore. The algorithm is implemented and compared to the classical one, to verify its efficiency and security. We conclude that public key systems based on IFS transformation perform more efficiently than RSA cryptosystems in terms of key size and key space. |
format |
Article |
author |
M. G. AL-Saidi, Nadia Md. Said, Mohamad Rushdan M. Ahmed, Adil |
spellingShingle |
M. G. AL-Saidi, Nadia Md. Said, Mohamad Rushdan M. Ahmed, Adil Efficiency analysis for public key systems based on fractal functions. |
author_facet |
M. G. AL-Saidi, Nadia Md. Said, Mohamad Rushdan M. Ahmed, Adil |
author_sort |
M. G. AL-Saidi, Nadia |
title |
Efficiency analysis for public key systems based on fractal functions. |
title_short |
Efficiency analysis for public key systems based on fractal functions. |
title_full |
Efficiency analysis for public key systems based on fractal functions. |
title_fullStr |
Efficiency analysis for public key systems based on fractal functions. |
title_full_unstemmed |
Efficiency analysis for public key systems based on fractal functions. |
title_sort |
efficiency analysis for public key systems based on fractal functions. |
publisher |
Science Publications |
publishDate |
2011 |
url |
http://psasir.upm.edu.my/id/eprint/25175/1/Efficiency%20analysis%20for%20public%20key%20systems%20based%20on%20fractal%20functions.pdf http://psasir.upm.edu.my/id/eprint/25175/ http://www.thescipub.com/ |
_version_ |
1643828582102859776 |