The El-Gamal AA_{\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem

The El-Gamal AA_{\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\beta}-function. The AA_{\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Ariffin, Muhammad Rezal Kamel, Mandangan, Arif, Ghani, Aniza Abdul, Atan, Kamel Ariffin Mohd, Abu, Nor Azman
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Ariffin, Muhammad Rezal Kamel
Mandangan, Arif
Ghani, Aniza Abdul
Atan, Kamel Ariffin Mohd
Abu, Nor Azman
description The El-Gamal AA_{\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\beta}-function. The AA_{\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_{\beta} Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.
doi_str_mv 10.48550/arxiv.1012.5579
format Article
fullrecord <record><control><sourceid>arxiv_GOX</sourceid><recordid>TN_cdi_arxiv_primary_1012_5579</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1012_5579</sourcerecordid><originalsourceid>FETCH-arxiv_primary_1012_55793</originalsourceid><addsrcrecordid>eNqFjr0KwjAUhbM4iLo7yX2B1lYt6ljEH3BxcBTKbb1qIIklSdUoPoBvbSoObk5nOOd8fIx14ygcTZIk6qO-8UsYR_EgTJLxtMle2xPBXARLlCggTbPHLieLT9hUueAFrMnBTLvSno0zliQEkIKiK2BZ6jMWJ6gsF_zO1RGsR5kqN2R9SPB9LvyDK9iT4UdVb1ABGiclWe3pxQ-5zRoHFIY632yx3mK-na2Cj3NWai5Ru6x2z2r34d_BGzEvUSg</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>The El-Gamal AA_{\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem</title><source>arXiv.org</source><creator>Ariffin, Muhammad Rezal Kamel ; Mandangan, Arif ; Ghani, Aniza Abdul ; Atan, Kamel Ariffin Mohd ; Abu, Nor Azman</creator><creatorcontrib>Ariffin, Muhammad Rezal Kamel ; Mandangan, Arif ; Ghani, Aniza Abdul ; Atan, Kamel Ariffin Mohd ; Abu, Nor Azman</creatorcontrib><description>The El-Gamal AA_{\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\beta}-function. The AA_{\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_{\beta} Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.</description><identifier>DOI: 10.48550/arxiv.1012.5579</identifier><language>eng</language><subject>Computer Science - Cryptography and Security</subject><creationdate>2010-12</creationdate><rights>http://arxiv.org/licenses/nonexclusive-distrib/1.0</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>228,230,776,881</link.rule.ids><linktorsrc>$$Uhttps://arxiv.org/abs/1012.5579$$EView_record_in_Cornell_University$$FView_record_in_$$GCornell_University$$Hfree_for_read</linktorsrc><backlink>$$Uhttps://doi.org/10.48550/arXiv.1012.5579$$DView paper in arXiv$$Hfree_for_read</backlink></links><search><creatorcontrib>Ariffin, Muhammad Rezal Kamel</creatorcontrib><creatorcontrib>Mandangan, Arif</creatorcontrib><creatorcontrib>Ghani, Aniza Abdul</creatorcontrib><creatorcontrib>Atan, Kamel Ariffin Mohd</creatorcontrib><creatorcontrib>Abu, Nor Azman</creatorcontrib><title>The El-Gamal AA_{\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem</title><description>The El-Gamal AA_{\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\beta}-function. The AA_{\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_{\beta} Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.</description><subject>Computer Science - Cryptography and Security</subject><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2010</creationdate><recordtype>article</recordtype><sourceid>GOX</sourceid><recordid>eNqFjr0KwjAUhbM4iLo7yX2B1lYt6ljEH3BxcBTKbb1qIIklSdUoPoBvbSoObk5nOOd8fIx14ygcTZIk6qO-8UsYR_EgTJLxtMle2xPBXARLlCggTbPHLieLT9hUueAFrMnBTLvSno0zliQEkIKiK2BZ6jMWJ6gsF_zO1RGsR5kqN2R9SPB9LvyDK9iT4UdVb1ABGiclWe3pxQ-5zRoHFIY632yx3mK-na2Cj3NWai5Ru6x2z2r34d_BGzEvUSg</recordid><startdate>20101227</startdate><enddate>20101227</enddate><creator>Ariffin, Muhammad Rezal Kamel</creator><creator>Mandangan, Arif</creator><creator>Ghani, Aniza Abdul</creator><creator>Atan, Kamel Ariffin Mohd</creator><creator>Abu, Nor Azman</creator><scope>AKY</scope><scope>GOX</scope></search><sort><creationdate>20101227</creationdate><title>The El-Gamal AA_{\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem</title><author>Ariffin, Muhammad Rezal Kamel ; Mandangan, Arif ; Ghani, Aniza Abdul ; Atan, Kamel Ariffin Mohd ; Abu, Nor Azman</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-arxiv_primary_1012_55793</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2010</creationdate><topic>Computer Science - Cryptography and Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Ariffin, Muhammad Rezal Kamel</creatorcontrib><creatorcontrib>Mandangan, Arif</creatorcontrib><creatorcontrib>Ghani, Aniza Abdul</creatorcontrib><creatorcontrib>Atan, Kamel Ariffin Mohd</creatorcontrib><creatorcontrib>Abu, Nor Azman</creatorcontrib><collection>arXiv Computer Science</collection><collection>arXiv.org</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ariffin, Muhammad Rezal Kamel</au><au>Mandangan, Arif</au><au>Ghani, Aniza Abdul</au><au>Atan, Kamel Ariffin Mohd</au><au>Abu, Nor Azman</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>The El-Gamal AA_{\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem</atitle><date>2010-12-27</date><risdate>2010</risdate><abstract>The El-Gamal AA_{\beta} Public Key Cryptosystem is a new asymmetric cryptosystem based on the piecewise AA_{\beta}-function. The AA_{\beta}-function which is essentially a one way Boolean function was motivated by the squaring and multiplying process while computing g^a (mod p) in the Diffie Hellman key exchange procedure and also computing C \equiv M^e (mod N) and M \equiv C^d (mod N) in the RSA cryptosystem. It was also motivated by the add and double point operation E=kG in the elliptic curve cryptosystem. The hard mathematical problem surrounding this newly designed asymmetric cryptosystem is the NP-complete problem known as the subset sum problem. The El-Gamal AA_{\beta} Public Key Cryptosystem mimics the El-Gamal Cryptosystem and the Elliptic Curve Cryptosystem by sending a two parameter ciphertext to the recipient.</abstract><doi>10.48550/arxiv.1012.5579</doi><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier DOI: 10.48550/arxiv.1012.5579
ispartof
issn
language eng
recordid cdi_arxiv_primary_1012_5579
source arXiv.org
subjects Computer Science - Cryptography and Security
title The El-Gamal AA_{\beta} Public Key Cryptosystem - A new approach utilizing the subset sum problem in designing an asymmetric cryptosystem
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-15T14%3A13%3A55IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-arxiv_GOX&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=The%20El-Gamal%20AA_%7B%5Cbeta%7D%20Public%20Key%20Cryptosystem%20-%20A%20new%20approach%20utilizing%20the%20subset%20sum%20problem%20in%20designing%20an%20asymmetric%20cryptosystem&rft.au=Ariffin,%20Muhammad%20Rezal%20Kamel&rft.date=2010-12-27&rft_id=info:doi/10.48550/arxiv.1012.5579&rft_dat=%3Carxiv_GOX%3E1012_5579%3C/arxiv_GOX%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true