On the key exchange and multivariate encryption with nonlinear polynomial maps of stable degree

نویسندگان

  • Vasyl Ustimenko
  • Aneta Wróblewska
چکیده

We say that the sequence gn, n ≥ 3, n → ∞ of polynomial transformation bijective maps of free module Kn over commutative ring K is a sequence of stable degree if the order of gn is growing with n and the degree of each nonidentical polynomial map of kind gn is an independent constant c. Transformation b = τgnkτ−1, where τ is the affine bijection, n is large and k is relatively small, can be used as a base of group theoretical Diffie-Hellman key exchange algorithm for the Cremona group C(Kn) of all regular automorphisms of Kn. The specific feature of this method is that the order of the base may be unknown for the adversary because of the complexity of its computation. The exchange can be implemented by tools of Computer Algebra (symbolic computations). The adversary can not use the degree of righthandside in bx = d to evaluate unknown x in this form for the discrete

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition

Let K be a commutative ring and K be an affine space over K of dimension n. We introduce the concept of a family of multivariate maps f(n) of K into itself with invertible decomposition. If f(n) is computable in polynomial time then it can be used as the public rule and the invertible decomposition provides a private key in f(n) based public key infrastructure. Requirements of polynomial ity of...

متن کامل

On the key exchange with nonlinear polynomial maps of stable degree

We say that the sequence g n , n ≥ 3, n → ∞ of polynomial transformation bijective maps of free module K n over commutative ring K is a sequence of stable degree if the order of g n is growing with n and the degree of each nonidentical polynomial map of kind g n k is an independent constant c. A transformation b = τ g n k τ −1 , where τ is affine bijection, n is large and k is relatively small,...

متن کامل

On New Examples of Families of Multivariate Stable Maps and their Cryptographical Applications

Let K be a general nite commutative ring. We refer to a family gn, n = 1, 2, . . . of bijective polynomial multivariate maps of K as a family with invertible decomposition gn = g ng 2 n . . . g k n, such that the knowledge of the composition of g n allows computation of g i n for O(n ) (s > 0) elementary steps. A polynomial map g is stable if all non-identical elements of kind g, t > 0 are of t...

متن کامل

On the key expansion of D(n, K)-based cryptographical algorithm

The family of algebraic graphs D(n,K) defined over finite commutative ring K have been used in different cryptographical algorithms (private and public keys, key exchange protocols). The encryption maps correspond to special walks on this graph. We expand the class of encryption maps via the use of edge transitive automorphism group G(n,K) of D(n,K). The graph D(n,K) and related directed graphs...

متن کامل

On desynchronised multivariate El Gamal algorithm

Families of stable cyclic groups of nonlinear polynomial transformations of affine spaces K over general commutative ring K of increasing with n order can be used in the key exchange protocols and related to them El Gamal multivariate cryptosystems. We suggest to use high degree of noncommutativity of affine Cremona group and modify multivariate El Gamal algorithm via the usage of conjugations ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Annales UMCS, Informatica

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2013