Software to Encrypt Messages Using Public-Key Cryptography

In this paper the development of a software to encrypt messages with asymmetric cryptography is presented. In particular, is used the RSA (Rivest, Shamir and Adleman) algorithm to encrypt alphanumeric information. The software allows to generate different public keys from two prime numbers provided by the user, the user must then select a public-key to generate the corresponding private-key. To encrypt the information, the user must provide the public-key of the recipient as well as the message to be encrypted. The generated ciphertext can be sent through an insecure channel, so that would be very difficult to be interpreted by an intruder or attacker. At the end of the communication, the recipient can decrypt the original message if provide his/her public-key and his/her corresponding private-key.




References:
[1] Rivest, R., Shamir A., Adleman L., A method for obtaining digital
signatures and public key cryptosystems, Communications of the ACM.
21 (1978), pp. 120-126.
[2] B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source
Code in C, Wiley & Sons, Inc. 1996.
[3] A.J. Menezes, P.C. Van Oorschot y S.A. Vanstone, 1997. "Handbook of
Applied Cryptography", CRC Press. pp 15-28 and. 283-291.
[4] J. A. Buchmann, Introduction to Cryptography. Marietta, GA: Springer-
Verlag, 2000, pp. 139-153.
[5] D.R. Stinson, Cryptography: Theory and Practice, Tercera edici├│n,
CRC Press. 2005.
[6] A. Fuster, Técnicas criptogr├íficas de protecci├│n de datos, Ed. Ra-Ma,
2001.
[7] Diffie, W., and Hellman, M. New directions in cryptography. IEEE
Trans. Inform. Theory IT-22, Nov. 1976, 644-654.
M. Bellare, P. Rogaway, Introduction to Modern Cryptography, San
Diego, CA., 2005. pp. 211-230.
[8] V. Zur Gathen, Joachim; Gerhard, J├╝rgen, "The Euclidean Algorithm",
en Modern Computer Algebra. Cambride University Press, (2003),
ISBN 0-521-82646-2.
[9] W. Stallings, Cryptography and Network Security: Principles and
Practice, 2da. Edici├│n, Prentice-Hall, New Jersey, 1999.
[10] Yang T. Wu C.W. and Chua L.O., Cryptography based on chaotic
systems. IEEE Trans. Circuits Syst. I 44(5)(1997)469-472.
[11] Cruz-Hernández C. and Serrano-Guerrero H., Cryptosystems based on
synchronized Chua-s circuits. In Procs. of the 16th IFAC World
Congress, July 3-8(2005) Prague, Czech Republic.
[12] R.M. L├│pez-Gutiérrez, C. Cruz-Hern├índez, C. Posadas-Castillo, and
E.E.García-Guerrero, Encrypted audio transmission using synchronized Nd:YAG lasers, Proceedings Of World Academy Of Science,
Engineering And Technology Vol. 30 (2008), ISSN 1307-6884.
[13] C. Posadas-Castillo, R. M. L├│pez-Gutiérrez, C. Cruz-Hern├índez,
Synchronization of chaotic solid-state Nd:YAG lasers: Application to
secure communication, Comm. in Nonlinear Science and Numerical
Simulation 13, (2008), pp. 1655-1667.
[14] A.Y. Aguilar-Bustos a,b, C. Cruz-Hernández, Synchronization of
discrete-time hyperchaotic systems: An application in communications,
Chaos, Solitons and Fractals, In press doi:10.1016/j.chaos.2008.05.012.
[15] L. G├ímez-Guzm├ín a, C. Cruz-Hern├índez a,*, R.M. L├│pez-Gutiérrez,
E.E. García-Guerrero, Synchronization of Chua-s circuits with multiscroll
attractors: Application to communication, Commun Nonlinear Sci
Numer Simulat, 14 (2009) pp. 2765-2775.