Abstract
For the transmission of information in public-key cryptosystems a receiver R makes an enciphering key ER public and keeps a deciphering key DR secret. A sender S can read R’s public key ER and enciphers a message M as ER(M). Only the authorised receiver R knows the correct key DR to reproduce the massage M by forming DR(ER(M)) = M. Here the key ER has to be computationally easy to handle, but it has to be computationally infeasible to derive DR from the knowledge of ER above. If sender S wants to “sign” the message, she sends ER(DS (M)) and the receiver deciphers it as ES(DR(ER(DS (M)))) = M. Here ES and DS are the enciphering and deciphering keys, respectively, of S.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Carlitz, L.: A note on permutation functions over a finite field. Duke Math. J. 29, 325–332 (1962)
Ecker, A.: Finite semigroups and the RSA-cryptosystem. Lecture Notes in Computer Science, vol.149, Springer-Verlag, 353–370 (1983).
Eier, R. and R. Lidl: Tschebyscheffpolynome in einer und zwei Variablen. Abh. Math. Seminar Univ. Hamburg 41, 17–27 (1974)
Lausch, H., W. Müller and W. Nöbauer: Über die Struktur einer durch Dicksonpolynome dargestellten Permutations gruppe des Restklassenringes modulo n. J. Reine Angew. Math. 261, 88–99 (1973).
Lausch, H. and W. Nöbauer: Algebra of Polynomials, North Holland, Amsterdam, 1973.
Levine, J. and J.V. Brawley: Some cryptographic applications of permutation polynomials. Cryptologia 1, 76–92 (1977)
Lidl, R.: Reguläre Polynome über endlichen Körpern. Beiträge Alg. Geometrie 2, 58–59 (1974).
Lidl, R. and H. Niederreiter: Finite Fields. Encyclopedia of Mathematics and its Applications vol. 20. Addison-Wesley, Reading, Massachusetts, 1983.
Lidl, R. and Ch. Wells: Chebyshev polynomials in several variables. Journal reine angew. Math. 255, 104–111 (1972).
Matthews, R.: The structure of the group of permutations induced by Chebyshev polynomial vectors over the ring of integers mod m. J. Austral. Math. Soc. Ser. A, 32, 88–103 (1982).
Müller, W.B. and W. Nöbauer: Some remarks on public-key cryptosystems. Studia Sci. Math. Hungar. 16, (1981) (to appear).
Müller, W.B. and W. Nöbauer: Über die Fixpunkte der Potenzpermutationen. Österr. Akad. Wiss. Math. Naturwiss.Kl. Sitzungsber.II (1983) (to appear).
Nöbauer, W.: Über Permutationspolynome und Permutationsfunktionen für Primzahlpotenzen. Monatsh. Math. 69, 230–238 (1965).
Rédei, L.: Über eindeutig umkehrbare Polynome in endlichen Körpern. Acta Sci. Math. (Szeged) 11, 85–92 (1946).
Smith, D.R.: Universal fixed messages and the Rivest-ShamirAdleman cryptosystem. Mathematika 26, 44–52 (1979).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1984 Plenum Press, New York
About this chapter
Cite this chapter
Lidl, R., Müller, W.B. (1984). Permutation Polynomials in RSA-Cryptosystems. In: Chaum, D. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-4730-9_23
Download citation
DOI: https://doi.org/10.1007/978-1-4684-4730-9_23
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4684-4732-3
Online ISBN: 978-1-4684-4730-9
eBook Packages: Springer Book Archive