Cryptosystems Based On Chebyshev Polynomials - Report
Cryptosystems Based On Chebyshev Polynomials - Report
Chaos Theory has not received much attention inside the cryptographic
community. However, it has had several applications in other communication
areas and people involved in Chaos Theory have been keeping working on the
idea of using the properties of chaotic systems in designing efficient
cryptographic primitives.
Many chaotic systems are defined over real numbers. On the other hand,
Cryptography deals with systems defined mostly on finite fields. This yields some
immediate consequences. Some ordinary design strategies and standard
cryptanalytic methods cannot be applied to cryptosystems based on chaotic
systems working over real numbers. Just to exemplify, cryptographic systems
have secret parameters taking values over a large but finite field. Hence, a brute
force attack, which simply tries all elements of the field in searching the secret
values might be infeasible but possible. If the range of the parameters of a
cryptosystem based on real numbers is a continous infinite interval, an exaustive
search is just impossible.
However, at the state of current knowledge, the security of chaos-based
cryptosystems defined over real numbers is not well understood.
Chebyshev Polynomials
where T0 ( x) = 1 and T1 ( x) = x .
T3 ( x) = 4.x 3 − 3.x
T4 ( x) = 8.x 4 − 8.x 2 + 1
Properties of Chebyshev polynomials
3. Alice sets her public key to ( x, Ts ( x)) and her private key to s.
Therefore:
X
M = .
T s.r ( x)
Implementation
Both encryption and decryption involve the evaluation of Chebyshev polynomials.
If we evaluate Chebyshev polynomials directly, applying the recursive definition,
then the computation of Tn(x) takes linear time in n. However, it is possible to
further reduce the computation to a logarithmic number of steps, by noticing that
T 2.n ( x) = T 2 (T n ( x)) ,
and re-organizing the computation. More precisely, we can use the recursive
relation for evaluating Chebyshev polynomials:
T0 = 1
T1 = x
2.Tn2/ 2 ( x ) − 1 if n is even
Tn ( x ) =
2.T Otherwise
( n −1) / 2 ( x ).T( n +1) / 2 ( x ) − x
Another important issue that must be considered when implementing the above
cryptosystem is the finite precision of the arithmetics. The semi-group property of
Chebyshev polynomials, stated by equation (3), holds only if the values s and r ,
chosen by Alice and Bob, are such that s < s 0 and r < r0 , where s 0 and r0 are
constant values depending on the arithmetics precision used in implementing the
encryption and decryption algorithms. They gave a table where, for certain
precisions, expressed in terms of bits, some possible upper bound for s 0 and r0
hold. For example, a 2048-bit precision implies constants s 0 and r0 smaller than
2970. Such upper bounds where empirical determined. No general relation linking
the arithmetic precision of the operations to the values of s 0 and r0 is currently
known.
Advantages
• Implements chaos theory
• used along with Diffie-Hellman & RSA
Disadvantages
• Already broken [2]
• semi-group property, allows implementation of trapdoor
References
1. Fee, J., Monagan, M.B. 2003. Cryptography using Chebyshev polynomials
2. Bergamo, P., D’Arco, P, Santis, A, and Kocarev, L. 2008. Security of Public
Key Cryptosystems based on Chebyshev Polynomials