An asymmetric encryption scheme that uses nested polynomials
Consider polynomials of the form
Now consider instead a nested function
Here is an analysis of a conversation between two people:
Person 1 calculates
Here is an analysis of the orders of all components of the encryption scheme:
Set-up: The expanded form of the polynomial can be created in
Encryption: Horner's method calculates
Decryption: By precalculating the cubic roots of all residues
Hacking: A hacker can compute a table of
It may be possible to reverse-engineering the j-array. It is unclear to me how to efficiently do this but it is not out of the realm of possibility. Also, although encryption and decryption are extremely fast, the set-up is time-consuming and may be problematic.
- Improve FFT algorithm.
- Adjust modulus calculations to allow large
$p$ values without overflow. - Implement Horner's method.