On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography

نویسندگان

  • Vasyl Ustimenko
  • Urszula Romanczuk
چکیده

We are going to observe special algebraic Turing machines designed for different assignments of cryptography such as classical symmetric encryption, public key algorithms, problems of secure key exchange, development of hash functions. The security level of related algorithms is based on the discrete logarithm problem (DLP) in Cremona group of free module over finite commutative ring. In the case of symbolic computations with ”sufficiently large number of variables” the order of generator (base of DLP) is impossible to evaluate and we have ”hidden discrete logarithm problem”. In the case of subgroups of Cremona group DLP is closely connected with the following classical difficult mathematical problems: (1) solving the system of nonlinear polynomial equations over finite fields and rings, (2) problem of finding the inverse map of bijective polynomial multivariable map. The complexity of Discrete Logarithm Problem depends heavily from the choice of base. Generation of good ”pseudorandom” base guarantees the high complexity of (1) and (2) and security of algorithms based on corresponding DLP. We will use methods of theory of special combinatorial time dependent Vasyl Ustimenko · Urszula Romańczuk Maria Curie-Sk lodowska University in Lublin Pl. Marii Curie-Sk lodowskiej 5, Lublin, Poland http://www.umcs.lublin.pl

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator

The paper is devoted to the implementations of the public key algorithms based on simple algebraic graphs A(n, K ) and D(n, K ) defined over the same finite commutative ring K . If K is a finite field both families are families of graphs with large cycle indicator. In fact, the family D(n, Fq) is a family of graphs of large girth (f.g.l.g.) with c = 1, their connected components C D(n, Fq) form...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

On Two-parameter Dynamical Systems and Applications

In this note some useful properties of strongly continuous two-parameter semigroups of operators are studied, an exponential formula for two-parameter semigroups of operators on Banach spaces is obtained and some applied examples of two-parameter dynamical systems are discussed

متن کامل

On Extremal Graph Theory, Explicit Algebraic Constructions of Extremal Graphs and Corresponding Turing Encryption Machines

We observe recent results on the applications of extremal graph theory to cryptography. Classical Extremal Graph Theory contains Erdős Even Circuite Theorem and other remarkable results on the maximal size of graphs without certain cycles. Finite automaton is roughly a directed graph with labels on directed arrows. The most important advantage of Turing machine in comparison with finite automat...

متن کامل

Dynamical Behavior of a Rigid Body with One Fixed Point (Gyroscope). Basic Concepts and Results. Open Problems: a Review

The study of the dynamic behavior of a rigid body with one fixed point (gyroscope) has a long history. A number of famous mathematicians and mechanical engineers have devoted enormous time and effort to clarify the role of dynamic effects on its movement (behavior) – stable, periodic, quasi-periodic or chaotic. The main objectives of this review are: 1) to outline the characteristic features of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013