Asymmetric cryptography and trapdoor one-way functions
Journal Title: Automatyka - Year 2016, Vol 20, Issue 2
Abstract
The asymmetric-key (public-key) encryption scheme is considered to be the most important discovery in the history of cryptography. It is based on the use of two complementary keys generated according to a chosen trapdoor one-way function (TOWF). Since its first implementation, asymmetric encryption has revolutionized our way of communicating as well as the safety of information transfer, and it is now widely used around the world for various purposes, especially in the field of online transaction security. The safety of the asymmetric-key scheme relies on the assumption that any known cryptographic attack using an efficient problem-solving algorithm will not be able to succeed in applying the inverse (decryption) function onto the cryptogram in a polynomial time without additional knowledge (secret information). The most-challenging aspect of creating a new asymmetric cryptographic algorithm is selecting a one-way function for encryption purposes and finding a trapdoor in its inverse. In this paper, the concept of public-key cryptography will be explained using the RSA algorithm as an example. In addition, the review of the most-important functions that are considered to be trapdoor one-way functions will be conducted.
Authors and Affiliations
Natalia Krzyworzeka
A sufficient condition for existence of constantly nondominated trajectories in linear time-invariant systems
This paper considers the multi-criteria optimal control problem in linear time-invariant systems with a single bounded input. It has been proven that, under certain assumptions, a state trajectory is non-dominated throug...
Asymmetric cryptography and trapdoor one-way functions
The asymmetric-key (public-key) encryption scheme is considered to be the most important discovery in the history of cryptography. It is based on the use of two complementary keys generated according to a chosen trapdoor...
The use of EMG signal in human-machine interface
In this paper, the analysis and processing algorithms of EMG signals have been presented. The main purpose of the research was to verify the usefulness of EMG signals in controlling a bionic prosthesis or exoskeleton. Th...
Analytic method grafpol TM of synthesing sequential control systems
This paper presents the Grafpol TM method and principles of synthesising sequential control algorithms by this method, as well as examples of applying this method for modelling processes and programming PLC controllers.
A Comparison between Integer Order and Non-integer Order Controllers Applied to a Water Levelling System
The purpose of this paper is to compare responses of two systems with two types of controllers: integer order PI controller and non-integer order PIλ controller (FOPI). Comparison is made on the grounds of time domain re...