A Systematic Expository Review of Schmidt-Samoa Cryptosystem

Full Text (PDF, 634KB), PP.12-21

Views: 0 Downloads: 0


Qasem Abu Al-Haija 1,* Mohamad M.Asad 1 Ibrahim Marouf 1

1. Department of Electrical Engineering, King Faisal University, Hufof 31982, Saudi Arabia

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2018.02.02

Received: 21 Nov. 2017 / Revised: 10 Jan. 2018 / Accepted: 13 Feb. 2018 / Published: 8 Apr. 2018

Index Terms

Information Security, Public Key Cryptography, Schmidt-Samoa Cryptosystem, Integer Factorization


Public key cryptographic schemes are vastly used to ensure confidentiality, integrity, authentication and non-repudiation. Schmidt-Samoa cryptosystem (SSC) is a public key cryptosystem, which depends on the difficulty of large integer factorization problem. The implementation of SSC to secure different recent communication technologies such as cloud and fog computing is on demand due to the assorted security services offered by SSC such as data encryption/decryption, digital signature and data integrity. In this paper, we provide a systematic review of SSC public key cryptosystem to help crypto-designers to implement SSC efficiently and adopt it in hardware or software-based applications. According to the literature, the effective utilization and design SSC can place it as a viable alternative of RSA cryptosystems and many others.

Cite This Paper

Qasem Abu Al-Haija, Mohamad M.Asad, Ibrahim Marouf,"A Systematic Expository Review of Schmidt-Samoa Cryptosystem", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.4, No.2, pp.12-21, 2018. DOI: 10.5815/ijmsc.2018.02.02


[1]Denning, D.E.R.E, “Cryptography and data security”, Reading, MA: Addison-Welsey. 

[2]Q. A. Al-Haija, N. A. Jebril, and A. AlShua'ibi. (2015). Implementing variable length Pseudo Random Number Generator (PRNG) with fixed high frequency (1.44 GHZ) via Vertix-7 FPGA family. Network Security and Communication Engineering, CRC press, Pp. 105 -108.

[3]C. Paar, J. Pelzl, (2010) ‘Understanding Cryptography’. Springer-Verlag Berlin Heidelberg Publisher. https://doi.org/10.1007/978-3-642-04101-3. 

[4]Menezes, A.J., van Oorschot, P.C. and Vanstone, S.A., (1996), 'Handbook of applied cryptography', CRC Press, http://cacr.uwaterloo.ca/hac/ 

[5]Q. Abu Al-Haija, et. al, (2014) 'Efficient FPGA Implementation of RSA Coprocessor using Scalable Modules', 9th International Conference on Future Networks & Communications (FNC), Elsevier, Canada. https://doi.org/10.1016/j.procs.2014.07.092

[6]Dierks and Rescorla, (2008), Standards Track: The Transport Layer Security (TLS) Protocol Version 1.2', The IETF Trust, RFC 5246.

[7]Developer Network (2017). 'Cryptographic Services', Microsoft. https://docs.microsoft.com/en-us/dotnet/standard/security/

[8]H. Sun. Enhancing the Security of the McEliece Public-Key Cryptosystem. Journal of Information Science and Engineering 16, pages 799-812, 2000.

[9]W. Trappe and L. C. Washington, (2002) 'Introduction to Cryptography with Coding Theory', Prentice Hall, vol. 1: p.p. 1-176, http://dl.acm.org/citation.cfm?id=560133

[10]Daniel J. Bernstein, Johannes Buchmann, Erik Dahmen, (2009), 'Post-Quantum Cryptography', Springer-Verlag Berlin Heidelberg, DOI: 10.1007/978-3-540-88702-7

[11]Katja Schmidt-Samoa, (2006) ‘A New Rabin-type Trapdoor Permutation Equivalent to Factoring’, Electronic Notes in Theoretical Computer Science, Elsevier, vol.157, issue 3, p.p.79-94. https://eprint.iacr.org/2005/278.pdf 

[12]Mark Burnett, (2007), ‘Blocking Brute Force Attacks', UVA Computer Science, University of Virginia (UVA).  http://www.cs.virginia.edu/~csadmin/gen_support/brute_force.php

[13]Desmedt, Y. Man in the middle attack. In: van Tilborg, H.C.A. (ed.) Encyclopedia of Cryptography and Security, p. 368. Springer, Heidelberg (2005) Xx

[14]M. M. Asad, I. Marouf, Q. Abu Al-Haija, " Investigation Study of Feasible Prime Number Testing Algorithms", Acta Technica Napocensis Electronics and Telecommunications, 58 (3), Pp. 11– 15, 2017

[15]I. Marouf, M. M. Asad, Q. Abu Al-Haija, " Reviewing and Analyzing Efficient GCD/LCM Algorithms for Cryptographic Design", International Journal of New Computer Architectures and their Applications (IJNCAA), By Society of Digital Information and Wireless Communications (SDIWC), 7(1), Pp. 1-7, 2017.

[16]M. M. Asad, I. Marouf, Q. Abu Al-Haija, Qasem Abu Al-Haija, " Review of Fast Multiplication Algorithms for Embedded Systems Design ", International Journal of Scientific & Technology Research (IJSTR), 6 (8), Pp., 238 – 242, 2017.

[17]Kogge, P. & Stone, H. "A Parallel Algorithm for the Efficient Solution of a General Class of Recurrence Equations". IEEE Transactions on Computers, 1973, C-22, 783-791Xx

[18]M. D. Ercegovac and T. Lang, “Digital Arithmetic," Morgan Kaufmann Publishers, Elsevier, Vol1, Ch2, pages (51-136), 2004.

[19]I. Marouf, M. M. Asad, Q. Abu Al-Haija, "Comparative Study of Efficient Modular Exponentiation Algorithms", COMPUSOFT, An international journal of advanced computer technology, 6 (8), Pp. 2381– 2389, 2017 

[20]L. Tawalbeh and Q. Abu Al-Haija," Enhanced FPGA Implementations for Doubling Oriented and Jacobi-Quartics Elliptic Curves Cryptography,” Journal of Information Assurance and Security (JIAS), By Dynamic Publishers Inc., Vol 6 (3), Pp. 167-175, 2010 

[21]C. Maxfield, " The Design Warrior’s Guide to FPGAs: Devices, Tools and Flows", Mentor Graphics Corporation and Xilinx, Elsevier, 2004.

[22]Nicos Bilalis, (2000), 'Computer Aided Design CAD', INNOREGIO Project: dissemination of innovation and knowledge management techniques, Technical University of Crete.

[23]David Harris Sarah Harris, (2012), ‘Digital Design and Computer Architecture’, Imprint: Morgan Kaufmann, ISBN: 9780123944245, Elsevier.

[24]Surinder Kaur, Pooja Bharadwaj, Shivani Mankotia,"Study of Multi-Level Cryptography Algorithm: Multi-Prime RSA and DES", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.9, pp.22-29, 2017.DOI: 10.5815/ijcnis.2017.09.03.

[25]Sapna Saxena, Neha Kishore," PRDSA: Effective Parallel Digital Signature Algorithm for GPUs ", International Journal of Wireless and Microwave Technologies(IJWMT), Vol.7, No.5, pp. 14-21, 2017.DOI: 10.5815/ijwmt.2017.05.02.

[26]M.I.Khalil,"Medical Image Steganography: Study of Medical Image Quality Degradation when Embedding Data in the Frequency Domain", International Journal of Computer Network and Information Security(IJCNIS), Vol.9, No.2, pp.22-28, 2017.DOI: 10.5815/ijcnis.2017.02.03

[27]J. Ettanfouhi, O. Khadir," Alternative Equations for Guillou-Quisquater Signature Scheme ", International Journal of Computer Network and Information Security, 2016, 9, 27-33, DOI: 10.5815/ijcnis.2016.09.04/