raport_plagiat_mang

Upload: omrau

Post on 05-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/2/2019 raport_plagiat_mang

    1/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    Image

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    11

    Turnitin Originality Report

    mang by Mang Mang

    From Quick Submit (Quick Submit)

    Processed on 09-May-2012 5:42 AM PDTID: 248361119Word Count: 1843

    Similarity Index63%Similarity by Source

    Internet Sources:11%

    Publications:62%

    Student Papers:12%

    sources:

    51% match (publications)

    C.H. Lin. "A new public-key cipher system based upon the diophantine equations", IEEETransactions on Computers, 1995

    2% match (student papers from 06/10/03)

    Submitted to CSU, San Jose State University on 2003-06-10

    2% match (Internet)

    http://hades.ph.tn.tudelft.nl/Internal/PHServices/Documentation/MathWorld/math/math/a/a137.htm

    1% match (publications)

    Morgos, Lucian. "Considerations about the Modeling of Software Defined Radio for MobileCommunications Networks", Journal of Electrical & Electronics Engineering/18446035, 20090601

    1% match (Internet from 11/3/05)

    http://intro.gemplus.com/smart/rd/publications/ps/Pai99phd.ps.gz

    1% match ( Internet from 4/8/12)

    http://arxiv.org/pdf/1005.0781.pdf

    1% match (Internet from 10/28/10)

    http://fsl.cs.uiuc.edu/pubs/rosu-2007-tr.pdf

    1% match (student papers from 05/04/11)

    Submitted to Higher Education Commission Pakistan on 2011-05-04

    1% match (Internet from 6/20/03)

    http://valle.fciencias.unam.mx/libros/criptografia/references.pdf

    1% match (Internet from 2/13/07)

    http://www.azbet.com/sttot/topbets.aspx?id=7020

    1% match (publications)

    " "

  • 8/2/2019 raport_plagiat_mang

    2/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    12

    13

    14

    Shaarawy, M.. "An improved public-key cipher system based upon diophantine equation", Computers &Industrial Engineering, 199812

    < 1% match (publications)

    Zhong Hong. "An Efficient (t, n)-Threshold Multi-Secret Sharing Scheme", First InternationalWorkshop on Knowledge Discovery and Data Mining (WKDD 2008), 01/2008

    < 1% match (Internet from 10/10/10)

    http://oak.cs.ucla.edu/~cho/papers/cho-sampling.pdf

    < 1% match (publications)

    Cusick, T.W.. "Cryptanalysis of a public key system based on Diophantine equations",Information Processing Letters, 19951027

    paper text:

    PUBLIC-KEY CRYPTOSYSTEM BASED ON THE DIOPHANTINE EQUATIONS Ioan Mang, Erica Mang

    4Department of Computers, University of Oradea, Faculty of Electrical

    Engineering and Information Technology, 1, Universitatii St., 410087 Oradea,

    Romania, E-mail: emang@keysys .ro Abstract This study analyses the

    mathematical aspects of diophantic equations and the

    potential of using them in cipher public-key systems. There are also presented the algorithms written in C

    language that were used for implementing such a system Keywords: public-key algorithms, Diophantine

    equation, cryptosystem, encryption. I. INTRODUCTION

    1In this paper, a new public-key cipher scheme is proposed. By the use of

    our scheme, the generating steps of keys are simple. Both the encryption

    and decryption procedures can be completed efficiently. Our cipher scheme

    is based upon the Diophantine equations. In general, a Diophantine

    equation is defined as follows: We are given a polynomial equation f(x

    1 ,x 2 ,...,x n ) -

    10 with integer coefficients and we are asked to find rational or integral

    solutions [6]. Throughout this paper, we shall assume that the solutions are

    nonnegative. For instance, consider the following equation: 3x 1

    + 4x 2 + 7x3 + 5x 4 = 78. (1) The

    1above equation is a Diophantine equation if we have to find a nonnegative

    solution for this equation. In fact, our

    solution is (x

    101 , x 2 , x 3 , x 4 )=(2, 5, 1, 9). (2)

    1A famous Diophantine equation problem is Hilbert's tenth problem, which

  • 8/2/2019 raport_plagiat_mang

    3/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    1A famous Diophantine equation problem is Hilbert's tenth problem, which

    is defined as follows: Given a system of polynomials Pi(

    x1, x2, ..., xn), 1 i m,

    1with integer coefficients, deter-mine whether it has a nonnegative integer

    solution or not. In and, it was shown that the Hilbert problem is undecidable

    for polynomials with degree 4. It was shown in that the Hilbert problem is

    undecidable for polynomials with 13 variables [1]. Gurari and Ibarra also

    proved that several Diophantine equations are in NP- complete class.

    II. THE UNDERLYING MATHEMATICS

    1Let w be some positive integer and the domain D be a set of positive

    integers in the range of [0, w]. Let w = 2 b - 1, where b is some positive

    integer. Assume that a sending message M with length NB bits is broken up

    into n pieces of submessages, namely m1, m2, and mn. Each submessage isof length b bits. In other words, we can represent each submessage by a

    decimal number mi and mi in D. Suppose that n pairs of integers (q 1 , k 1 ), (q

    2 , k 2 ), ... and (q n , kn) are chosen such that the following conditions hold:

    1) qi's are pairwise relative primes; i.e. 1. (q i ,q j ) = 1 for

    i j. 2. 2) k 1 >

    2w for i = 1,2, ..., n. 3. 3) qi > kiw(qi mod ki), and qi mod ki 0, for i

    =

    11, 2, ..., n. These n integer pairs (qi, ki)'s will be kept secret and used to

    decrypt messages. For convenience, we name the above three conditions

    the DK-conditions since they will be used as deciphering keys. Note that for

    the generating of pairwise relatively primes, one can consult. Furthermore,

    the following numbers are computed. First, compute Ri = qi mod ki and

    compute Pi's such that two conditions are satisfied: 1) Pi mod qi = Ri, and 2)

    Pj mod qi = 0 if i = j. Since qu's are pairwise relatively primes, one solution for

    Pi's satisfying the above two conditions is that Pi = Qibi with Qi

    qi i j and bi

    1is chosen such that Qibi modqi =Ri. Since Qi and qi are relatively prime, bi's

    can be found by using the extended Euclid's algorithm. Note that the

    average number of divisions performed by the extended Euclid's algorithm

    for finding bi is approximately 0.843. ln (qi) + 1.47. Secondly, compute

    Ni = qi /(kiRi )

  • 8/2/2019 raport_plagiat_mang

    4/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    1for i = 1, 2, ..., n. Finally, compute n si = PiNi mod Q

    where Q qi (3) i 1

    1That is, we have a vector S = (s1, s2, ..., sn) with each

    component computed as above. After this, S

    2can be used as the enciphering key for encrypting messages. By

    conducting a vector product between M = (m1, m2, ..., mn) and S = (s1, s2, ...,

    sn); i .e., n C = E(S ,M) = M*

    S = misi (4) i 1

    1a message M is transformed to its ciphertext C, where * denotes the vector

    product operation. Conversely, the ith component m i, in M can be revealed

    by the following operation: mi = D(( qi,ki ),C)

    = kiC/ qi

    1for i = 1, 2, ..., n (5) Theorem 2.1 shows that (5) is the inverse function of (4).

    The following lemmas are helpful in the proof of the theorem. Lemma 2.1:

    Let a and b be some positive integers where b > a. Then for all

    x,

    8a x / b < x if x ab/(b -a). Proof: Let Then x/b x / b

    1c for some integer c. c

  • 8/2/2019 raport_plagiat_mang

    5/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    1Furthermore, the right-hand side of (13) is identical to m i and that of (12) is

    mi kiRimi /qi . On the other hand, since mi is an integer and kiRimi / qi ki Ri w, we know that qi> ki Ri2 mi /(Ri (ki - mi)). That is, x

    ab / (b- a) is satisfied. By applying Lemma 2.1, it can be seen that

    Rimi qi /(kiRi) < qi. Therefore, ki Ri mi qi /(kiRi) mod ki qi = ki Ri mi qi /(kiRi) (10) Lemma2.3: Since

    1Pi's satisfy the following two conditions: 1)

    Pimodqi=qimodki=Ri;and

    12) Pj mod qi = 0 if i j j, n kiC' mod

    kiqi = (ki i 1 mi Pi Ni )mod kiqi= =kimiRi qi /(kiRi )modkiqi. (16) Furthermore, by Lemma2.2, kimiRi qi /(kiRi )

    mod kiqi = kimiRi qi /(kiRi ) (17) That is, kiC mod kiqi = kimiRi qi /(kiRi )

    1for i=1,2,...,n. In other words,

    kiC=yikiqi+kimiRi qi /(kiRi ) . (18) for some integers yi. Moreover, Hence kiC'/ qi yiki kiC/qi=yiki+kimiRi qi /

    (kiRi ) /qi. (19) yiki kimiRiqi/(kiRi) kimiRi qi/(kiRi) /qi By applying Lemma 2.3, we have Thus Second, let then

    iC' / q i / q i (20) k = yiki + mi. (21) mi=modki. (22) n Qqi. (23) i 1 n C mod Q = ( i 1 m i s i ) mod Q = ((m 1 s 1

  • 8/2/2019 raport_plagiat_mang

    6/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    kiC=yikiqi+kimiRi qi /(kiRi ) . (18) for some integers yi. Moreover, Hence kiC'/ qi yiki kiC/qi=yiki+kimiRi qi /

    (kiRi ) /qi. (19) yiki kimiRiqi/(kiRi) kimiRi qi/(kiRi) /qi By applying Lemma 2.3, we have Thus Second, let then

    iC' / q i / q i (20) k = yiki + mi. (21) mi=modki. (22) n Qqi. (23) i 1 n C mod Q = ( i 1 m i s i ) mod Q = ((m 1 s 1

    1mod Q) + ... + (mnsn mod Q)) mod Q = (m1 (s1 mod Q)

    + ... n + mn(sn

    1mod Q))mod Q = ( m i s i ) mod Q

    = C mod Q. i 1 That

    1is, C = C(mod Q). Let C = C + zQ, for some positive

    1integer z. We have k iC/q i mod ki =( k i (C'

    zQ)/ qi mod ki = = ( k iC' / qi kizQi ) mod ki = mod ki (24) Therefore, a vector n Q qi (27) i

    131 S=(s 1 ,s 2 , . . . ,s n

    ) is obtained. There the

    1n-tuple S of intgers is published and used as the public key

    of the cryptosystem for enciphering messages. The chosen parameters

    7(q 1 ,k 1 ), (q 2 ,k 2 ), ..., (q n ,k n

    ) are

    1kept and used as the private key to decipher messages received.

    1Specifically, let user A be the sender and user B be the

    1receiver, and let A be sending a message represented by

    M = (m 1 , m 2 ,...,m n ), where mi

    1is a b-bits submessage represented by a decimal

    1number in the range of [0, 2b -1]. Then (m 1 ,m 2 ,...,m n ) is enciphered by (4)

    into an integer C. Afterward, the integer C

  • 8/2/2019 raport_plagiat_mang

    7/8

    nitin Originality Report

    09.05.2012 1//localhost/D:/raport_plagiat_mang.html

    1number in the range of [0, 2b -1]. Then (m 1 ,m 2 ,...,m n ) is enciphered by (4)

    into an integer C. Afterward, the integer C

    1is sent to user B as the ciphertext of the original message M.

    1On the receiving of integer C user B is able to convert C into (m

    1 ,m 2 ,...,m n ) by applying (5). IV. CONCLUSION AND DISCUSSION

    1A new public-key cryptosystem is investigated in this paper. The

    motivation of this attempt is trying to use real numbers for its dense

    property. However, i f real numbers are used as keys, several disturbing

    problems, such as representation and precision will be encountered. With

    the help of integer functions, the possibility of using an integer as a key is

    increased significantly. That is, for a cryptanalyst who tries to break the

    cipher, he has to conduct an exhaustive search on a long list of integer

    numbers.

    In other words, mi= k modki. iC' / qi III. THE CONSTRUCTION OF THE CRYPTOSYSTEM In this section, the

    1algorithms for constructing the cryptosystem, encrypting

    messages, respectively, are presented.

    1First, each user picks n pairs of parameters

    6(q 1 ,k 1 ), (q 2 ,k 2 ),..., and (q n ,k n ) such that the

    DK-conditions are satisfied. Afterward, and Q (25) q j j i Ni qi /(ki (qi modki )) (26) are computed, and bis are

    integers chosen

    11such that Qibi mod qi = qi mod ki, for i = 1,2, . . . n.

    Let Pi = Qibi and si = PiNi

    14mod Q, for i = 1,2,...,n, where

    Fig.

    11. Key Generating for Each User

    Fig.

  • 8/2/2019 raport_plagiat_mang

    8/8

    nitin Originality Report

    12. - Encryption Procedure for Sender A

    Fig. 3. - Decryption Procedure for Receiver B REFERENCES [1]

    3D.E. Knuth: The Art of Computer Programming. Vol. 1: Fundamental

    Algorithms, second ed. Reading, MA: Addison-Wesley, (1980). [2] D.E. Knuth:

    The Art of Computer Programming. Vol. 2: Seminumerical Algorithms, 2nd

    ed. Reading, MA: Addison-Wesley, (1981).

    [3] S

    1.P. Tung: Computational complexities of diophnatine equations with

    parameters, J. Algorithms, vol. 8, pp. 324- 336,

    (1987). [4]

    5H.C. Williams: A modification of the RSA public-key encryption procedure,IEEE Trans. Information Theory, vol. 26, pp. 726-729 (1980).

    [5]

    9L.J. Hoffman: Modern Methods for Computer Security and Privacy, second

    edition, Printice -Hall,

    (1987) [6] Waclaw Sierpinski, Elementary Theory of numbers, Warszawa (1964)