2. International Journal of Management (IJM), ISSN 0976 â 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)
cryptosystem. A public key cryptosystem consists of a public key, which is used for encryption, and
a private key, used for decryption. Therefore, anybody can encrypt plaintext since the encryption key
is available to everyone, but only the holders of the private key corresponding to the public key used
for encryption can decrypt the ciphertext [1, 2].
The first asymmetric cryptosystems appeared in 1970s to address the problem of key
management in symmetric cryptography. In 1976, Whitfield Diffie and Martin Hellman published a
key management scheme that was the predecessor to the first public-key cryptosystems; it later
became known as the Diffie-Hellman Key Exchange Protocol. Later, several asymmetric
cryptosystems were developed, including ElGamal, Rabin, and RSA cryptosystems [6,2,1].
The public-key cryptosystems rely heavily on mathematical functions known as trapdoor
functions; these are easy to apply in one direction but extremely difficult to apply in the inverse,
which is required for decryption of the ciphertext [1]. The major difference between the main
asymmetric cryptosystems is the function used to produce the public key. Many of them rely on
factoring a large number into two large prime numbers that compose the given number. This is not a
trivial task, especially when each of the primes generally have more than 100 digits, which is usually
the case in well-designed cryptosystems.
However, there are other mechanisms used to derive public keys that we will briefly explain
in the following sections.
1.1 The Diffie-Hellman Key Exchange Protocol
The Diffie-Hellman Key Exchange Protocol, often shortened to simply Diffie-Hellman, was
invented in 1976 through the collaboration of Whitfield Diffie and Martin Hellman ([9], [1]). DiffieHellman is not a cryptosystem; rather, it is a means for two parties to jointly produce a shared secret
key over an insecure communications channel with minimal risk of a third party obtaining the key. In
fact, Diffie-Hellman was the first such method. Diffie-Hellman accomplishes this by taking
advantage of the properties of multiplicative groups of integers modulo that is, Zon. Specifically, we
select a prime number for, the modulo value of the group, and we select a prime number as the
generator of the group. These two conditions ensure that Zon will always be a cyclic group this is the
property needed for Diffie-Hellman to work as expected.
The key to Diffie-Hellman, of course, is that Alice and Bob end up with the same shared
secret key in steps 4 and 5 of the above algorithm. This shared secret can be used to establish a
secure communications channel. Considering this allows us to understand that the Diffie-Hellman
Key Exchange Protocol is an excellent tool that can be used to securely establish a secure
communications channel when only insecure means of communication are available.
1.2 ElGamal
The ElGamal encryption system was developed by Taher Elgamal in 1984 ([8], [1]). It is
based heavily on the same principle as Diffie-Hellman: a cyclic multiplicative group modulo some
prime number.
Generally speaking, of course, the number of possible messages will far exceed p â 1. To
remedy this, ElGamal is generally used multiple times on several pieces of the message. One obvious
disadvantage of ElGamal, consequently, is that any ciphertext generated using ElGamal is twice as
large as the plaintext.
Another disadvantage is that pâ1 must generally be larger than the number of possible
messages, simply because this number is unlikely to be prime.
It is easy to verify that ElGamal is indeed a valid cryptosystem: cx1
ÂŽ (gk)x ÂŽ (gx)k ÂŽ yk ÂŽc2/m (mod p).
210
3. International Journal of Management (IJM), ISSN 0976 â 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)
1.3 Rabin Cryptosystem
The Rabin cryptosystem is another example of an asymmetric cryptosystem. It was created
by Michael O. Rabin in 1979. Rabinâs work has theoretical importance because it provided the first
provable security for public-key cryptosystems [6]. It can be proven that recovering the entire
plaintext from the ciphertext has same complexity as factoring large numbers [1,7].
The effectiveness of this algorithm has been questioned mainly because of the fact that it produces 4
results, one correct and 3 false. Identifying the correct one is usually performed with a guess. If the
plaintext is intended to represent a text message, guessing is not difficult; however, if the plaintext is
intended to represent a numerical value, this issue becomes a problem that must be solved with some
kind of disambiguation scheme. It is possible to choose plaintexts with special structures, or to add
padding, to eliminate this problem. The most common way of implementing disambiguation is
known as Blum disambiguation, which is based on characteristics of pseudorandom number
generator [6].
The efficiency of the Rabin cryptosystem is at least as good as that of the RSA cryptosystem.
In Rabin, encryption is computed by calculating a square modulon. This is more efficient than RSA,
which requires the calculation of at least a cube. For decryption, the results of congruence are applied
through the Chinese remainder theorem, along with two modular exponentiations. Here the
efficiency is comparable to RSA. Disambiguation introduces additional computational costs, which
is the main reason preventing the Rabin cryptosystem from finding widespread practical use.
1.4 RSA
RSA is the most commonly used cryptosystem these days. It was invented in 1977 by Ron
Rivest, Adi Shamir, and Len Adleman, where the name RSA comes from [4].The most important
part of asymmetric algorithms is the key generation.
The security of RSA is based on difficulty of factoring large prime numbers. Therefore, the
choice of primes is very crucial, which raises the biggest issue. The problem with sufficiently large
primes is to check their primality, to compute gcd(e, Ă(n)) to make sure they are relatively prime,
and to compute the private key d satisfying ed ÂŽ 1 (mod Ă(n)). There are several algorithms that can
speed up some calculations required for encryption and decryption of a message using the RSA
algorithm, which make this cryptosystem very likely to be used these days for transmitting secure
information ([4], [5]).
2. WEAKNESSES IN ASYMMETRIC CRYPTOSYSTEMS
Even though asymmetric cryptosystems are relatively secure, there are a few issues that do
not guarantee the complete safety and invulnerability of these kinds of cryptosystems. One of the
main problems in public-key cryptography is to prove that the public key is authentic, i.e., it has not
been replaced with another key by a malicious user. There are two main approaches to address this
problem. The first approach relies on a third party, which acts as a certificate authority that certifies
the ownership of key. The other approach is the âweb of trustâ to which a user has access through a
password [2].
As any other cryptosystem, the asymmetric one is vulnerable to brute-force attacks. However,
with a large enough key, the exhaustive search attack is not practical, and therefore, this type of
weakness can be reduced by enlarging the size of the key [2].
The other method of distributing private key of an asymmetric cryptosystem is through the
key translation center which acts as a trusted server between parties that do not directly share the key
between them. Each party shares a different key with the key translation center. The way this sharing
information works is that one person sends an encrypted message to the trusted server using its own
211
4. International Journal of Management (IJM), ISSN 0976 â 6502(Print), ISSN 0976 - 6510(Online),
Volume 4, Issue 6, November - December (2013)
key, and the center translates it to the message that can be decrypted using the other partyâs key. To
accomplish this, the key transfer center maintains a secure database of usersâ secret keys [3].
Another example of systems implicitly guaranteeing authenticity is the system using selfcertified public keys, which is exactly the same as the identity-based public key with the exception
that the manipulations of the public key are done by the individual user rather than the trusted third
party [3].
CONCLUSION
Asymmetric cryptosystems have become a popular way of encrypting data since their first
appearance in the 1970s. The main reason for development of these types of cryptosystems lies in the
security of key management and the vulnerability under malicious attacks. The asymmetric
cryptosystem contains a pair of keys, an encryption key, which is available to public, and a
decryption key, which is private.
REFERENCES
[1]
Mao, W., Modern Cryptography: Theory & Practice, Upper Saddle River, NJ: Prentice Hall
PTR, 2004.
[2] âPublic-key cryptography,â Wikipedia,
<http://en.wikipedia.org/wiki/Public-key cryptography>
[3] Menezes, A., van Oorschot, P., and Vanstone, S. Handbook of applied cryptography, CRC
Press, 1996.
[4] âRSA algorithm,â <http://www.dimgt.com.au/rsa alg.html>
[5] âRSA cryptosystem,â <http://ww3.algorithmdesign.net/handouts/RSA.pdf>
[6] âRabin cryptosystems,â Wikipedia, <http://en.wikipedia.org/wiki/Rabin cryptosystem>
[7] N. R. Wagner, The laws of cryptography: Rabinâs version of RSA,
<http://www.cs.utsa.edu/ wagner/laws/Rabin.html>
[8] âElGamal encryption,â Wikipedia, <http://en.wikipedia.org/wiki/ElGamal encryption>
[9] âDiffie-Hellman key exchange,â Wikipedia,
<http://en.wikipedia.org/wiki/Diffie-Hellman key exchange>
[10] Rahul Jassal, âWrapped RSA Cryptography Check on Window Executable using
Reconfigurable Hardwareâ, International Journal of Computer Engineering & Technology
(IJCET), Volume 3, Issue 3, 2012, pp. 291 - 299, ISSN Print: 0976 â 6367, ISSN Online:
0976 â 6375.
[11] Varun Shukla and Abhishek Choubey, âA Comparative Analysis of the Possible Attacks on
RSA Cryptosystemâ, International Journal of Electronics and Communication Engineering
& Technology (IJECET), Volume 3, Issue 1, 2012, pp. 92 - 97, ISSN Print: 0976- 6464,
ISSN Online: 0976 â6472.
212