On the High Dimensional RSA Algorithm – A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory

by   Zhiyong Zheng, et al.

The most known of public key cryptosystem was introduced in 1978 by Rivest, Shamir and Adleman [19] and now called the RSA public key cryptosystem in their honor. Later, a few authors gave a simply extension of RSA over algebraic numbers field( see [20]- [22]), but they require that the ring of algebraic integers is Euclidean ring, this requirement is much more stronger than the class number one condition. In this paper, we introduce a high dimensional form of RSA by making use of the ring of algebraic integers of an algebraic number field and the lattice theory. We give an attainable algorithm (see Algorithm I below) of which is significant both from the theoretical and practical point of view. Our main purpose in this paper is to show that the high dimensional RSA is a lattice based on public key cryptosystem indeed, of which would be considered as a new number in the family of post-quantum cryptography(see [17] and [18]). On the other hand, we give a matrix expression for any algebraic number fields (see Theorem 2.7 below), which is a new result even in the sense of classical algebraic number theory.


page 1

page 2

page 3

page 4


Security Impact Analysis of Degree of Field Extension in Lattice Attacks on Ring-LWE Problem

Modern information communications use cryptography to keep the contents ...

On the Optimality of Gauss's Algorithm over Euclidean Imaginary Quadratic Fields

In this paper, we continue our previous work on the reduction of algebra...

Algebraic aspects of solving Ring-LWE, including ring-based improvements in the Blum-Kalai-Wasserman algorithm

We provide several reductions of Ring-LWE problems to smaller Ring-LWE p...

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory

The present survey reports on the state of the art of the different cryp...

A formal proof of Hensel's lemma over the p-adic integers

The field of p-adic numbers Q_p and the ring of p-adic integers Z_p are ...

Algebraic Extension Ring Framework for Non-Commutative Asymmetric Cryptography

Post-Quantum Cryptography PQC attempts to find cryptographic protocols r...

Formalizing Norm Extensions and Applications to Number Theory

Let K be a field complete with respect to a nonarchimedean real-valued n...

Please sign up or login with your details

Forgot password? Click here to reset