Some remarks concerning the M.I.T. public-key cryptosystem

Let a messageM be encrypted by raisingM to a powere moduloR, whereR ande are integers which are made public. The recipient of this encrypted form ofM can decipher it by raising the cipher text to a powerd moduloR. Only the recipient knows the values of the two large primesp1,p2 such thatR=p1p2; consequently, only he knowsd, ase is preselected such that (e, (p1 − 1)(p2 − 1))=1 anded ≡1 (mod (p1 − 1)(p2 − 1)).Recently several attacks have been made on the proposed security of this cryptosystem under iteration of the encryption procedure. In this paper we discuss methods of selecting the primesp1,p2 and the encryption exponente such that the possibility of breaking this cryptosystem by using an iteration procedure is minimized. Several numerical results are also presented.

[1]  J. Littlewood,et al.  Some problems of ‘Partitio numerorum’; III: On the expression of a number as a sum of primes , 1923 .

[2]  J. Rosser,et al.  Approximate formulas for some functions of prime numbers , 1962 .

[3]  A. E. Western,et al.  Tables of indices and primitive roots , 1968 .

[4]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[5]  Marvin C. Wunderlich,et al.  A design for a number theory package with an optimized trial division routine , 1974, CACM.

[6]  J. M. Pollard,et al.  Theorems on factorization and primality testing , 1974, Mathematical Proceedings of the Cambridge Philosophical Society.

[7]  D. H. Lehmer,et al.  New primality criteria and factorizations of 2^{}±1 , 1975 .

[8]  J. Brillhart,et al.  A method of factoring and the factorization of , 1975 .

[9]  J. Pollard A monte carlo method for factorization , 1975 .

[10]  Gary L. Miller Riemann's Hypothesis and Tests for Primality , 1976, J. Comput. Syst. Sci..

[11]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[12]  Volker Strassen,et al.  A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..

[13]  G. J. Simmons,et al.  Preliminary Comments on the M.I.T. Public-Key Cryptosystem , 1977, Cryptologia.

[14]  Tore Herlestam Critical remarks on some public-key cryptosystems , 1978 .

[15]  Ronald L. Rivest,et al.  Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.

[16]  R. Rivest Critical remarks on “Critical Remarks on Some Public-Key Cryptosystems” by T. Herlestam , 1979 .

[17]  Robert P. Backstrom Table errata: “A method of factoring and the factorization of ₇” [Math. Comp. 29 (1975), 183–205; MR 51 #8017] by M. A. Morrison and J. Brillhart , 1980 .