A simple generalization of the El-Gamal cryptosystem to non-abelian groups II
نویسنده
چکیده
The MOR cryptosystem is a generalization of the ElGamal cryptosystem, where the discrete logarithm problem works in the automorphism group of a group G, instead of the group G itself. The framework for the MOR cryptosystem was first proposed by Paeng et al. [13]. Mahalanobis [10] used the group of unitriangular matrices for the MOR cryptosystem. That effort was successful: the MOR cryptosystem over the group of unitriangular matrices over q is as secure as the ElGamal cryptosystem over the finite field q. In this article we study the MOR cryptosystem over SL d q . If we assume that the only way to break the proposed MOR cryptosystem is to solve the discrete logarithm problem in the automorphism group, then it follows that the proposed MOR cryptosystem is as secure as the ElGamal cryptosystem over qd . This is a major improvement. This MOR cryptosystem works with matrices of degree d over q. To encrypt (decrypt) a plaintext (ciphertext) one works over the field q. To break this cryptosystem, one has to solve a discrete logarithm problem in qd . Even for a small positive integer d, this provides us with a considerable security advantage. There are some challenges in the implementation of this cryptosystem. Implementing matrix multiplication is hard. Though we have not reached the optimum speed for that [4], it might always stay harder than multiplication in a finite field. So one needs to find an optimum strategy to present the automorphisms
منابع مشابه
A simple generalization of El-Gamal cryptosystem to non-abelian groups
In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equi...
متن کاملA note on using finite non-abelian p-groups in the MOR cryptosystem
The MOR cryptosystem [9] is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a p-group, a cryptosystem was built in [4]. It seems resoanable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields. A natural question arises can one make a better cryptosystem using p-groups? In this paper we show that the answer is no.
متن کاملA Simple Generalization of the Elgamal Cryptosystem to Non-abelian Groups
In this article we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the ElGamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equ...
متن کاملUsing El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction
This paper discuses comparatively more efficient and cost effective scheme of El Gamal Cryptosystem by introducing the concept of using the established cryptosystems into message feedback mode. The idea behind this is, “an established cryptographic scheme can be used to initiate any communication, and further users may switch to some lightweight process so that the degree of secrecy is maintain...
متن کاملFirst non-abelian cohomology of topological groups II
In this paper we introduce a new definition of the first non-abelian cohomology of topological groups. We relate the cohomology of a normal subgroup $N$ of a topological group $G$ and the quotient $G/N$ to the cohomology of $G$. We get the inflation-restriction exact sequence. Also, we obtain a seven-term exact cohomology sequence up to dimension 2. We give an interpretation of the first non-a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2008 شماره
صفحات -
تاریخ انتشار 2008