Content uploaded by Senthilkumar Mohan
Author content
All content in this area was uploaded by Senthilkumar Mohan on Dec 16, 2016
Content may be subject to copyright.
IJPT| Dec-2016 | Vol. 8 | Issue No.4 | 21869-21874 Page 21869
ISSN: 0975-766X
ANALYZING THE STRENGTH OF PELL’S RSA
Chandrasegar T1, Senthilkumar M1, R.Silambarasan2, Carlos Becker Westphall 3
1Assistant Professor (Senior), SITE school, VIT University, India
2M.Tech Student ,SITE School, VIT University, Vellore, India.
3Professor, Federal University of Santa Catarina, Departamento de Informática e Estatística
Florianópolis, Santa Catarina, Brazil.
Email: mosenkum@gmail.com
Abstract
By taking two distinct Diophantine equations with distinct large prime numbers and two different co-ordinates, two
secret keys are generated at the same time so that two users can encrypt their messages / plaintext. Hence two sets of
public key exponents with one set of private key exponents were the result of proposed algorithm.
Keywords: Pell’s equation, Diophantine equation, Public key cryptosystem.
Introduction
The traditional RSA asymmetric key cryptographic system dates to be first in the public key cryptography comprising
public key creation, encrypting original message, private key generation and decrypting the encrypted message. In this
system the selection of prime numbers pairs larger and larger ensures the strong protection to cipher text from the third
parties in cracking back to original plaintext with means of different attacking schemes in the existing literature
including continued fraction method private key retrieval, Euclidean and extended Euclidean division algorithm method
of tracking private key are some with few. Continued fraction constraint of private key value less than that of modular
value to the power constant is admissible only when the two distinct prime numbers are limited to certain bit length.
When this bit length increased the retrieval process with continued fraction method would lead to longer time for
computing. Same scenario holds true for extended Euclidean division method as well. Next with RSA cryptography
method only one user can make encryption (or) in other lines, user’s single message only able to encrypt at the time.
Albeit holds this fine as far as the asymmetric key cryptography, the time and cost computing raised the issue which
tended further study in this regime. As an instance either of public key generation (or) private key generation cost only
can be made less also in time, by making large variations to one another. There hence give rise the study of re-balanced
RSA where encryption key and decryption key are balanced with respect to the aspects of time and cost followed by the
Chinese Remainder Theorem method of private key tracing from RSA and led to RSA-CRT Likewise in the different
direction first method of dual key generation by taking small public key exponent at one time and small private key
exponent on the other led to Dual RSA key generation where the results are provisioned with Lattice based breaking
IJPT| Dec-2016 | Vol. 8 | Issue No.4 | 21869-21874 Page 21870
system and analyzed to re-balanced RSA and RSA-CRT. The similar kind of producing two public keys by the simple
linear equations such as Diophantine equation what under influence called Pell’s equation is explained in this work. This
algorithm does not four sets of equations and two sets of co-ordinates system as in Dual RSA. Rather by simply taking
two Diophantine equations the two sets of secret keys are produced thence two users at a time can encrypt their message.
The proposed algorithm is proved with the help of numerical example calculations.
Literature Survey
In [1] taking four straight lines (linear equations) with two co-ordinates are comprised to give four set of prime numbers
name yp 1 ;q 1 ;p 2 ;q 2 and iterated until q 2 satisfies for the prime numbers albeit other three too need to be prime.
From these four prime numbers where x0 sandy 0s are chosen in such a way that two instances of public and private keys
were the result. Exactness of the key generation in either case were verified through Dual RSA equations form its key. In
[2] trailing the method of Euclidean algorithm, modified trial division method is employed in the private key generation
which back from the known modulus value and public key as prime numbers be-come larger extent this method helped
in encrypting digital data’s.
In [3] the encryption key generation is explained in the means of prime pairs selected for Euler’s totient function
calculation followed by system modulus computation. This leads to public key generation study in terms of prime
numbers and primitive roots. In [4] Knapsack problem with Merkle-Hellman number theoretic concepts are employed in
public key exponent calculation and showed the hardness of breaking back of private key. Defined their strong ability of
scheme against various known attacks including brute force. In[5] Prime number selection procedure in public key from
modulus of system and totient function of Euler computation are further extended and studied and proved the proposed
system secure against Shamir attacks. In [6] library function in C++ comprising encryption key generation and
groupware technique in encapsulation method described in encrypting and decrypting files stored in windows platform.
In [7] n carry array is used in the calculation of public key when the prime numbers are larger and proved the efficiency
in digital signature along with class lib in C++ were given. In [8] Pell’s equation first introduced in RSA cryptography in
key generation and management by fixing threshold value and proved there scheme is strong against coalition attack.
In [9] secret key generation from Pell’s equation by taking the roots of Diophantine equation for the constant prime is
proposed and analyzed its complexity with N-prime RSA, Dual RSA dn traditional RSA. Crypt analysis of Fermat’s
attack, Weiner’s continued fraction and extended Euclidean method were compared along with numerical examples. In
IJPT| Dec-2016 | Vol. 8 | Issue No.4 | 21869-21874 Page 21871
thick communication, two Diophantine equations are taken at a time and showed two secret key sets along with private
key exponent set. Proposed system/ algorithm makes two different users to encrypt their messages and send while
receiver receives two cipher texts and decrypt to original text with single private key set, thus the proposed scheme
makes the communication to one receiver to two senders at a time. While in other go, the sender can encrypt their two
different messages with two secret keys and communicate with receiver and receiver performs as explained earlier. The
proposed algorithm is explained with numerical example to prove its efficiency.
Proposed Work
Prof Pell studied the Diophantine equation of the form y2 dx 2 = 1. For the given positive values d the x and y values
should be found which satisfying the governing equation. One such solution is ford= 61, x and y has values
respectively2261590and1776319041.In this work the secret key generation is based on the above mentioned Diophantine
but he d values are chosen as prime number in due course positive prime integers. The proposed algorithm takes two
Diophantine equations and followed by selection of two distinct prime integers for d and then values of x0s and y0s
which satisfying Pell’s equation. Detailed proposed system is given in algorithm 1.
IJPT| Dec-2016 | Vol. 8 | Issue No.4 | 21869-21874 Page 21872
Therefore output of algorithm 1 produces two set of public keys are obtained namely(
1;d;P;X1;N)and(2;d;Q;X2;N) with the private key(e3;N).Continuing in same way Dual RSA is further expanded to
generate one more pair set of instance in key, the following algorithm variant to Dual RSA is proposed and takes the
following form
IJPT| Dec-2016 | Vol. 8 | Issue No.4 | 21869-21874 Page 21873
Hence the output of algorithm 2 is(e;N1 =p 1 q 1 ;n 2 = p 2 q 2 ;n 3 = p 3 q 3) and (d;p1;q1;p2;q2;p3;q3). Also it was
found that algorithm 2 satisfies the three simultaneous equation so called key equations for variation of Dual RSA key
generation.
Numerical Examples
Proposed system algorithm 1 is verified by taking numerical examples such as with respect to first Diophantine equation
when P = 7the prime number the values satisfying are X1= 3and Y1= 8. For the second Diophantine equation when
prime number Q= 11satisfies for X2= 3and Y2= 10where the first three steps are cover. From step 4 of algorithm 1
taking a = 13and b = 17givesN = 221and -(N) = 192. From step 5 the e value is taken as e= 5. From Eqs (1) and (2) of
algorithm 1 calculations yields 1= 39552and 2= 40100 which satisfies Eqs (3) and (4) respectively. From step 9 the d
values found to be d= 77. From Eqs (5) and (6) values of s1 and s2 are calculated and yielding s1= 149and s2 = 149.
Considering the plaintext M= 19, step11 gives the cipher text C= 15and in turn step 12 retracts original message M=
19from Eqs (7) and (8) respectively. Therefore two set of public keys are (39552;77;7;3;221) and (40100;77;11;3;221).
Along with the private key set(53;221).Example of proposed algorithm 2 takes, for x1= 20 and x2= 9if step 1 of
algorithm 2 gives p1 =181 which is prime number. For y2 = 12 is step 2 yields p2= 241which is prime. For y1= 8 in step
3 gives p3 = 73which is prime. From step 4 q1= 97which is prime number. Step 5 takes e = 7and d = 12343where k1=
2is taken satisfying step 5. Then from steps 6 and 7 the values are q2= 19and q3= 41both are prime. Therefore output of
algorithm 2 is (7;17557;4579;2993) and (12343;181;97;241;19;73;41). From this example it can be verified that three
key equations are satisfied with above values similar to that of Dual RSA two key equations.
Conclusion
Upon this communication two algorithms are pro-posed in key generating scheme for RSA crypto-graphic system. While
the Pell’s RSA key generation produces single pair of key, an variant in aspects of two sets production in key generation
by considering two distinct Pell’s equations the strength is further improved to one step. Presented numerical example
proves the efficiency of designed system also makes two users to encrypt their data. It can be further expanded by
considering simultaneous Pell’s system of equations in key generating where n users able to cipher their data
concurrently.
Alternate to the Dual RSA scheme of key generation, further k values were considered and designed the so called trivial
RSA one step ahead to Dual RSA where three instances of RSA are generated which improves the security than that of
IJPT| Dec-2016 | Vol. 8 | Issue No.4 | 21869-21874 Page 21874
Dual RSA. In the pipeline working of variant of Dual RSA the trivial RSA algorithm 2 is explained and proved with
numerical example. Also believed which can be further developed by taking n number of k 0 s and hence multiple
instances of RSA well be deployed as algorithm 2.
References
1. H.-M. Sun, Mu-En. Wu, W-C. Tang and M. J. Hinek. ”Dual RSA and its security analysis.”IEEE Trans. Inf. Theory.
Vol. 33,No. 8, pp 2922-2933, 2007.
2. Palchaudhury. Modified Trail division for Implementation ofRSA Algorithm with Large Integers Int. J. Advanced
Network-ing and Applications Volume: 01, Issue: 04, Pages: 210-216 , 2009
3. Ravi Shankar Dhakar, Amit Kumar Gupta, Prashant Sharma Modified RSA Encryption Algorithm (MREA) pgno:
426-429advance Advanced Computing & Communication Technolo-gies (ACCT), 2012, ISBN: 978-1-4673-0471-9
4. Sonal Sharma, Prashant Sharma, Ravi Shankar Dhakar, RSAAlgorithm Using Modified Subset Sum Cryptosystem
Pgno:457-461, Computer and Communication Technology (ICCCT),2011, ISBN: 978-1-4577- 1385-9
5. H. C. WILLIAMS, A Modification of the RSA Public-Key Encryption Procedure pgno: 726-729, IEEE transaction
on In-formation Theory.
6. Suli Wang, Ganlai Liu, File encryption and decryption system based on RSA algorithm pgno: 797-800,
Computational and Information Sciences (ICCIS), 2011 , ISBN: 978-1-4577-1540-2.
7. Ying-yu Cao, Chong Fu, An Efficient Implementation of RSA Digital Signature Algorithm, pgno: 100-103,
Intelligent Computation Technology and Automation (ICICTA), 2008,ISBN:978-0-7695-3357-5
8. Sarma, K.V.S.S.R.; Kumar, G.S.K.; Avadhani, P.S., Threshold cryptosystem using Pells equation,pgno: 413-416,
Information Technology: New Generations (ITNG), 2011, ISBN: 978-1-61284-427-5.
9. Chandra Segar. T and Vijayaragavan. R.”Pell’s RSA key gener-ation and its security analysis.” Int conference of
Computing, Communications and Networking Technologies (ICCNT), pp 1-5, 2013.