Content deleted Content added
MarcGarver (talk | contribs) Added {{One source}} tag to article (TW) |
bmatrix environment simpler; the matrices are not equal, but equivalent under mod 5; s/-/−/ |
||
Line 22:
=== Key generation ===
Like RSA, Cayley-Purser begins by generating two large primes ''p'' and ''q'' and their product ''n'', a [[semiprime]]. Next, consider [[general linear group|GL]](2,''n''), the [[general linear group]] of
:<math>
:<math>
This group is chosen because it has large order (for large semiprime ''n''), equal to (''p''<sup>2</sup>
Let <math>\chi</math> and <math>\alpha</math> be two such matrices from GL(2,''n'') chosen such that <math>\chi\alpha^{-1} \not= \alpha\chi</math>. Choose some natural number ''r'' and compute:
Line 74:
:<math>x\left(\beta_{ij}^{-1} - \alpha_{ij}\right) \equiv y \pmod n.</math>
If <math>d</math> is known, <math>d \mathrm{I} + \gamma = \chi'</math>
This flaw does not preclude the algorithm's use as a mixed private-key/public-key algorithm, if the sender transmits <math>\epsilon</math> secretly, but this approach presents no advantage over the common approach of transmitting a [[symmetric encryption]] key using a public-key encryption scheme and then switching to symmetric encryption, which is faster than Cayley-Purser.
==See also==
* [[Non-commutative cryptography]]
== References ==
|