The Schmidt-Samoa cryptosystem is an asymmetric
cryptographic
Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
technique, whose security, like
Rabin
Rabin is a Hebrew surname. It originates from the Hebrew word ''rav'' meaning Rabbi, or from the name of the specific Rabbi Abin. The most well known bearer of the name was Yitzhak Rabin, prime minister of Israel and Nobel Peace prize Laureate.
...
depends on the difficulty of integer
factorization
In mathematics, factorization (or factorisation, see English spelling differences) or factoring consists of writing a number or another mathematical object as a product of several ''factors'', usually smaller or simpler objects of the same kind ...
. Unlike Rabin this algorithm does not produce an ambiguity in the decryption at a cost of encryption speed.
Key generation
* Choose two large distinct primes ''p'' and ''q'' and compute
* Compute
Now ''N'' is the public key and ''d'' is the private key.
Encryption
To encrypt a message ''m'' we compute the ciphertext as
Decryption
To decrypt a ciphertext ''c'' we compute the plaintext as
which like for Rabin and
RSA
RSA may refer to:
Organizations Academia and education
* Rabbinical Seminary of America, a yeshiva in New York City
*Regional Science Association International (formerly the Regional Science Association), a US-based learned society
*Renaissance S ...
can be computed with the
Chinese remainder theorem
In mathematics, the Chinese remainder theorem states that if one knows the remainders of the Euclidean division of an integer ''n'' by several integers, then one can determine uniquely the remainder of the division of ''n'' by the product of the ...
.
Example:
*
*
Now to verify:
*
Security
The algorithm, like Rabin, is based on the difficulty of factoring the modulus ''N'', which is a distinct advantage over RSA.
That is, it can be shown that if there exists an algorithm that can decrypt arbitrary messages, then this algorithm can be used to factor ''N''.
Efficiency
The algorithm processes decryption as fast as Rabin and RSA, however it has much slower encryption since the sender must compute a full exponentiation.
Since encryption uses a fixed known exponent an
addition chain In mathematics, an addition chain for computing a positive integer can be given by a sequence of natural numbers starting with 1 and ending with , such that each number in the sequence is the sum of two previous numbers. The ''length'' of an addit ...
may be used to optimize the encryption process. The cost of producing an optimal addition chain can be amortized over the life of the public key, that is, it need only be computed once and cached.
References
A New Rabin-type Trapdoor Permutation Equivalent to Factoring and Its Applications
{{cryptography navbox, public-key
Public-key encryption schemes