Using Extended Chebyshev Polynomials to Construct a Trap-door One-way Function Wang Dahu 1, 2 ,Wei Xueye 1 1.School of Electronic and Information Engineering Beijing Jiaotong University Beijing,100044, China 2.State Key Laboratory of Information Security Institute of Software of Chinese Academy of Sciences Beijing,100044, China Abstract:-We extend Chebyshev polynomials from real field to finite field, and suggest a trap-door one-way function. According to the proposed function, a secure and practical encryption scheme is given. And an entity authentication scheme is presented. Key-words:-Extended Chebyshev polynomials, Trap-door one-way function, Encryption algorithm, Entity authentication, Security 1. Introduction It is obvious that the development of a practical public-key scheme depends on discovery of a suitable trap-door one-way function [1-5]. The definition of a trap-door one-way function is easy to calculate in one direction and infeasible to calculate in the other direction unless certain additional information is known. We can summarize as following [15]: A trap-door one-way function is a family of invertible function, such that Y= f k ( X ) easy, if k and x are known X= f k1 (Y ) easy, if k and Y are known X= f k1 (Y ) infeasible, if Y is known but k is not known The function is difficult to find, as evidenced by the fact that only several such schemes have received widespread acceptance in the several decades since the concept of public-key cryptography was proposed. In this paper, we propose one trap-door one-way function based on extended Chebyshev polynomials and theirs performances are analyzed. Theirs application in encryption are given in the end. Section 2 shows the basic properties of the extended Chebyshev polynomials over finite fields, which can be used as a trap-door one-way function. In section 3, we give an encryption scheme based on Section 2. Section 4 provides a entity authentication scheme based on the function in Section2. In the end, we close the paper with conclusion. 2. A trap-door one-way function based on extended Chebyshev map over finite fields 2.1 Extended Chebyshev map over finite fields Since Chebyshev polynomials have semi-group property [6] [7] [8] on real field R, they also have semi-group property over integer Z. Then we can further extend the definition field and value field of Chebyshev polynomials to finite fields ZP, where P is a prime number. Over finite field ZP we can definite the Chebyshev polynomials as the following. Definition 2.1.1[14] : Let n∈ Z and variable xZP . The polynomial Tn ( x ) (mod P ) Tn ( x (mod P )) (mod P ) (3) According to[7] , the semi-group property of extended Chebyshev polynomials over finite fields is that: Tr (Ts ( x (mod P))) (mod P) Trs ( x) (mod P) Ts (Tr ( x (mod P))) (mod P) Tr (Ts ( x)) (mod P) Trs ( x) (mod P) Ts (Tr ( x)) (mod P) r, s Z (4) 2.2 A new trap-door one-way function based on extended Chebyshev polynomials over finite fields We know any Chebyshev polynomial Tn ( x ) can be written as that: Tn ( x ) : Z P Z P is recursively defined as Tn ( x) (2 xTn1 ( x) Tn2 ( x)) (mod P) n2 (5) (1) T0 ( x ) 1 (mod P ) where Tn ( x) (a n x n a n1 x n 1 a1 x1 a0 ) (mod P) and In equation (5), gaining Tn ( x ) given n and x is very easy, but gaining n given T1 ( x ) x (mod P ) . Tn ( x ) and x is very difficult, and almost Thus, we can get Chebyshev polynomials on finite field ZP as the following: unfeasible in computation. The difficulty can be compared with the intractability of discrete logarithm problem. When the value of n in equation(5) is equal to the value of discrete logarithm, solving the n of equation (5) is more difficult and complex than solving discrete logarithm for the existence of other low power elements in equation (5), such as xn-1, xn-2, and so on. So equation (5) has a good one-way property in computation. Equally, Chebyshev polynomials on finite fields have good one-way property. In equation (5), n is equal to a trapdoor. If we know n and x, it is easy and T0 ( x ) 1 (mod P ) T1 ( x ) x ( m o dP ) T2 ( x ) ( 2 x 2 1 ) (mod P ) T3 ( x ) ( 4 x 3 3 x ) (mod P ) T4 ( x ) ( 8 x 4 8 x 2 1 ) (mod P ) … (2) Tn ( x ) is algebraic polynomial, so we have the following equation: fast to compute Tn ( x ) by using following fast algorithm. According to the semi-group property of equation (4), k k k and n s1 1 s 2 2 s mm , Tn ( x ) can be computed by that: Tn ( x) (mod P) T (T (T k1 s1 km sm k2 s2 The ( x) )) (mod P) number of SK Z *n integer . iteration 1 The process of key pair generation According to the Chebyshev polynomials on finite fields, the process of key pair generation is that: (1) Randomly selects a large is k 1 +k 2 +…+k m . x Z *P , and and an integer computes PK TSK ( x ) (mod P ) . If n isn’t known, the only possible way is to compute Tk (x) for all k=2,…,n, (2) Let SK as private key and {x,PK} as public key. and find whether Tk (x) = Tn (x) one by one. However, if n is a large enough number, it is impossible to do so. Due to the one-way trapdoor property of Chebyshev polynomials over finite fields, they can be used to construct key public key encryption algorithm and entity authentication scheme. Because we extend the Chebyshev polynomials from x∈ [-1, 1] to x Z P , the attack by the way of [7] is invalid to our cryptosystem. Moreover, it is clear that our cryptosystem is more secure than RSA and ElGamal system. Here we assume that ZP is a finite field and Zn is an integer ring. All computation of the following is over ZP and Zn. 3. Public key encryption algorithm based on the new trap-door one-way function For the one-way trapdoor and semi-group properties of Chebyshev polynomials on finite fields, we can use it to construct public key encryption algorithm, which includes three processes: key generation, encryption and decryption. 2 The process of message encryption We assume Alice wants to send message M Z *P to Bob, and uses Bob’s public key to encrypt the message. The process is that: (1) Alice randomly selects a larger integer R Z *n , and uses Bob’s public key {x , PK} to compute as the following: K 1 TR ( x ) (mod P ) and K 2 TR ( PK ) (mod P ) . (2) Alice Computes ciphertext C M K 2 (mod P) . (3) Alice sends encrypted message {C, K1} to Bob. . 3 The process of message decryption After receiving the encrypted message, Bob decrypts the message by his private key. The process is that: (1) Bob computes K 2 TSK ( K 1 ) (mod P ) . (2) Bob decrypts the message as that: M C ( K 2 ) 1 (mod P ) . From the equation (4), we know that: TSK ( K1) (mod P) TSK (TR ( x)) (mod P) TR (TSK ( x)) (mod P) Tsi ()(mod p) Ts (Ts (Ts Ts ()) )(mod p) Tsi ()(mod p) . Setup Phase – Server Side 1. The server generates a random integer r. 2. Computes and sends Tr (m) (mod p) to the user. Setup Phase – User Side 1. The user chooses a random integer s. i-th Authentication Phase i 1. The user computes Ts (m) (mod p), and TR ( PK ) (mod P) K 2 auth= Ts (Tr (m)) (mod p), and sends both So the message M can be decrypted correctly. values to the server. 2. The server i computes 4 Entity authentication scheme ' auth = Ts (Tr (m)) (mod p) based on the new trap-door whether auth=auth . Then, if the check is satisfied, the access is granted. one-door function Entity authentication is defined as follows: Definition 4.1.1[14]: Entity authentication is the process whereby one party is assured (through acquisition of corroborative evidence) of the identity of a second party involved in a protocol, and that the second has actually participated (i. e., is active at, or immediately prior to, the time evidence is acquired). We propose a scheme based on extended Chebyshev polynomials, by means of which a user can efficiently authenticate himself to a server in order to log in. Apart minor implementation details, the scheme works as follows: Within Z p , let m Z n , and denote by * * Tsi () (mod p) the map Ts () (mod p) iterated i times, i.e., i and checks ' It is easy to see that, due to the same theory background, the performances of the scheme are similar to that of encryption scheme above. 5 Conclusion In conclusion, in this letter we have proposed a trap-door one-way function based on extended Chebyshev polynomials. And we have firstly given encryption scheme and entity authentication algorithm based on extended Chebyshev polynomials over finite fields, which is secure and practical. From the analyses of this paper, we can conclude that (i) any algebraic polynomials, which have semi-group property of equation (2) and recursion property like equation (1) over real field, can be used to construct a trap-door one-way function. (ii) the proposed function can be used to construct public key encryption algorithm , entity authentication, key agreement algorithm and digital signature algorithm. The detailed study of the proposed function as well as the further application in cryptography is topics of our future research. Acknowledgements The authors gratefully acknowledge the assistance and support of Dr. Ning Hongzhou and State Key Laboratory of Information Security. References: [1] Diffie W., Hellman M.E., New directions in cryptography, Information Theory, IEEE, 1976, 22(6): 644-654. [2] Rivest R.L., Shamir A., Adleman L., Method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978, 21(2): 120-126. [3] Rivest R.L., Shamir A., Adleman L., On digital signatures and public key cryptosystems, MIT Laboratory for Computer Science, Technical Report, 1979. [4] Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, Information Theory, IEEE, 1985, 31(4): 469-472. [5] Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, CRYPTO 84 on Advances in Cryptology Proceedings, 1984, 10-18. [6] Kocarev L., Tasev Z., Public-key encryption based on Chebyshev maps, The 2003 IEEE International Symposium on Circuits and Systems Proceedings, 2003. 28-31. [7] Pina Bergamo, Paolo D'Arco, Alfredo De Santis, et al., Security of public key cryptosystems based on Chebyshev polynomials, http://citebase.eprints.org, 2004. [8] D Xiao, X Liao, G Tang, Chuandong Li. Using Chebyshev chaotic map to construct infinite length hash chains, Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium , 25-28 May 2004, Volume: 1 ,Pages:11-12. [9] Xiao Di, Liao Xiaofeng, Wong K.W. An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals , Issue: 4, February, 2005, Volume: 23, pp. 1327-1331 [10] Kocarev L. Chaos-based cryptography: a brief overview.Circuits and Systems Magazine, IEEE , Issue: 3 , 2001 Volume: 1 ,Pages:6 – 21 [11] Kocarev L, Sterjev M, Amato P. RSA encryption algorithm based on torus automorphisms. Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on , 23-26 May 2004 Volume: 4 ,Pages:IV - 577-80 Vol.4 [12]Kohda Tohru , Fujisaki Hirohi. Jacobian elliptic Chebyshev rational maps.Physica D Issue: 3-4, January 15, 2001, Volume: 148,pp. 242-254 [13] William Stallings. Cryptography and Network Security Principles and Practices .Third Edition.Prentice Hall.2003 [14] A.Menezes, P. van Oorschot, S.Vanstone, Handbook of Applied Cryptography, CRC Press, 1997. [15]Douglas R. Stinson. Cryptography Theory and Practice, second edition, CRC Press, 2002. Biography Wang Dahu was born in Jiangsu, China in 1969. He received his B.S. degree in electronics engineering from Tongji University, Shanghai, China, in 1991, and the M.S. degree in electrical engineering from Henan Polytechnic University in 2003.He is a graduate in school of electronic and information engineering, Beijing Jiaotong University, Beijing, China. His research interests include channel code and information security in mobile communication system. His email is wangdahu-69@126.com. or dahuwang@126.com. Wei Xueye was born in Shandong, China,in 1964. He received his B.S. and M.S. from Tianjing University, China, in 1987 and 1990,the Ph.D. from Beijing Polytechnic University, China in 1995.He is a Professor in school of electronic and information engineering, Beijing Jiaotong University, Beijing, China. His research interests include DSP and nonlinear theory.