A simple generalization of the El-Gamal cryptosystem to non-abelian groups II

نویسنده

  • Ayan Mahalanobis
چکیده

The MOR cryptosystem is a generalization of the ElGamal cryptosystem, where the discrete logarithm problem works in the automorphism group of a group G, instead of the group G itself. The framework for the MOR cryptosystem was first proposed by Paeng et al. [13]. Mahalanobis [10] used the group of unitriangular matrices for the MOR cryptosystem. That effort was successful: the MOR cryptosystem over the group of unitriangular matrices over q is as secure as the ElGamal cryptosystem over the finite field q. In this article we study the MOR cryptosystem over SL d q . If we assume that the only way to break the proposed MOR cryptosystem is to solve the discrete logarithm problem in the automorphism group, then it follows that the proposed MOR cryptosystem is as secure as the ElGamal cryptosystem over qd . This is a major improvement. This MOR cryptosystem works with matrices of degree d over q. To encrypt (decrypt) a plaintext (ciphertext) one works over the field q. To break this cryptosystem, one has to solve a discrete logarithm problem in qd . Even for a small positive integer d, this provides us with a considerable security advantage. There are some challenges in the implementation of this cryptosystem. Implementing matrix multiplication is hard. Though we have not reached the optimum speed for that [4], it might always stay harder than multiplication in a finite field. So one needs to find an optimum strategy to present the automorphisms

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A simple generalization of El-Gamal cryptosystem to non-abelian groups

In this paper we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the El-Gamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equi...

متن کامل

A note on using finite non-abelian p-groups in the MOR cryptosystem

The MOR cryptosystem [9] is a natural generalization of the El-Gamal cryptosystem to non-abelian groups. Using a p-group, a cryptosystem was built in [4]. It seems resoanable to assume the cryptosystem is as secure as the El-Gamal cryptosystem over finite fields. A natural question arises can one make a better cryptosystem using p-groups? In this paper we show that the answer is no.

متن کامل

A Simple Generalization of the Elgamal Cryptosystem to Non-abelian Groups

In this article we study the MOR cryptosystem. We use the group of unitriangular matrices over a finite field as the non-abelian group in the MOR cryptosystem. We show that a cryptosystem similar to the ElGamal cryptosystem over finite fields can be built using the proposed groups and a set of automorphisms of these groups. We also show that the security of this proposed MOR cryptosystem is equ...

متن کامل

Using El Gamal Cryptosystem in Message Feedback Mode for Computing Cost Reduction

This paper discuses comparatively more efficient and cost effective scheme of El Gamal Cryptosystem by introducing the concept of using the established cryptosystems into message feedback mode. The idea behind this is, “an established cryptographic scheme can be used to initiate any communication, and further users may switch to some lightweight process so that the degree of secrecy is maintain...

متن کامل

First non-abelian cohomology of topological groups II

In this paper we introduce a new definition of the first non-abelian cohomology of topological groups.  We relate the cohomology of a normal subgroup $N$ of a topological group $G$ and the quotient $G/N$ to the cohomology of $G$. We get the inflation-restriction exact sequence. Also, we obtain a seven-term exact cohomology sequence up to dimension 2. We give an interpretation of the first non-a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008