Skip to content
Surf Wiki
Save to docs
general/public-key-encryption-schemes

From Surf Wiki (app.surf) — the open knowledge base

Schmidt-Samoa cryptosystem

Asymmetric cryptographic technique based on integer factorisation


Asymmetric cryptographic technique based on integer factorisation

The Schmidt-Samoa cryptosystem is an asymmetric cryptographic technique, whose security, like Rabin depends on the difficulty of integer factorization. Unlike Rabin this algorithm does not produce an ambiguity in the decryption at a cost of encryption speed.

Key generation

  • Choose two large distinct primes p and q and compute N = p^2q
  • Compute d = N^{-1} \mod \text{lcm}(p-1,q-1)

Now N is the public key and d is the private key.

Encryption

To encrypt a message m we compute the ciphertext as c = m^N\mod N.

Decryption

To decrypt a ciphertext c we compute the plaintext as m = c^d \mod pq, which like for Rabin and RSA can be computed with the Chinese remainder theorem.

Example:

  • p = 7, q = 11, N = p^2q = 539, d = N^{-1} \mod \text{lcm}(p-1,q-1) = 29
  • m = 32, c = m^N \mod N = 373

Now to verify:

  • m = c^d \mod pq = 373^{29} \mod pq = 373^{29} \mod 77 = 32

Security

The algorithm, like Rabin, is based on the difficulty of factoring the modulus N, which is a distinct advantage over RSA. That is, it can be shown that if there exists an algorithm that can decrypt arbitrary messages, then this algorithm can be used to factor N.

Efficiency

The algorithm processes decryption as fast as Rabin and RSA, however it has much slower encryption since the sender must compute a full exponentiation.

Since encryption uses a fixed known exponent an addition chain may be used to optimize the encryption process. The cost of producing an optimal addition chain can be amortized over the life of the public key, that is, it need only be computed once and cached.

References

Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Schmidt-Samoa cryptosystem — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report