Electrical resistivity measurement of concrete: Difference between revisions

From formulasearchengine
Jump to navigation Jump to search
en>JustAGal
Disambiguated: ampampere
en>Martin Berka
Added to impedance measurement category (real part per length, but techniques are similar)
 
Line 1: Line 1:
The '''Schmidt-Samoa cryptosystem''' is an asymmetric [[cryptographic]] technique, whose security, like [[Rabin cryptosystem|Rabin]] depends on the difficulty of integer [[factorization]].  Unlike Rabin this algorithm does not produce an ambiguity in the decryption at a cost of encryption speed.
I'm Ankе and I live in Purmerend. <br>I'm inteгested in Afгicana Studies, Knitting and English art. I like to travel and watсhing Gгey's Anatomy.<br><br>Also visit my page ... [http://ladresseduperenoel.wordpress.com/ pere noel]
 
==Key generation==
 
* Choose two large distinct primes ''p'' and ''q'' and compute <math>N = p^2q</math>
* Compute <math>d = N^{-1} \mod \text{lcm}(p-1,q-1)</math>
 
Now ''N'' is the public key and ''d'' is the private key.
 
==Encryption==
 
To encrypt a message ''m'' we compute the ciphertext as <math>c = m^N \mod N.</math>
 
==Decryption==
 
To decrypt a ciphertext ''c'' we compute the plaintext as <math>m = c^d \mod pq,</math> which like for Rabin and [[RSA (algorithm)|RSA]] can be computed with the [[Chinese remainder theorem]].
 
Example:
* <math>p = 7, q = 11, N = p^2q = 539, d = N^{-1} \mod \text{lcm}(p-1,q-1) = 29</math>
* <math>m = 32, c = m^N \mod N = 373</math>
 
Now to verify:
* <math>m = c^d \mod pq = 373^{29} \mod pq = 373^{29} \mod 77 = 32</math>
 
==Security==
The algorithm, like Rabin, is based on the difficulty of factoring the modulus ''N'', which is a distinct advantage over RSA.
That is, it can be shown that if there exists an algorithm that can decrypt arbitrary messages, then this algorithm can be used to factor ''N''.
 
==Efficiency==
The algorithm processes decryption as fast as Rabin and RSA, however it has much slower encryption since the sender must compute a full exponentiation.
 
Since encryption uses a fixed known exponent an [[addition-chain exponentiation|addition chain]] may be used to optimize the encryption process. The cost of producing an optimal addition chain can be amortized over the life of the public key, that is, it need only be computed once and cached.
 
==References==
* [http://eprint.iacr.org/2005/278.pdf A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications]
 
{{cryptography navbox|public-key}}
 
[[Category:Public-key encryption schemes]]

Latest revision as of 20:36, 14 February 2014

I'm Ankе and I live in Purmerend.
I'm inteгested in Afгicana Studies, Knitting and English art. I like to travel and watсhing Gгey's Anatomy.

Also visit my page ... pere noel