On Dynamical Systems of Large Girth or Cycle Indicator and Their Applications to Multivariate Cryptography
نویسندگان
چکیده
We are going to observe special algebraic Turing machines designed for different assignments of cryptography such as classical symmetric encryption, public key algorithms, problems of secure key exchange, development of hash functions. The security level of related algorithms is based on the discrete logarithm problem (DLP) in Cremona group of free module over finite commutative ring. In the case of symbolic computations with ”sufficiently large number of variables” the order of generator (base of DLP) is impossible to evaluate and we have ”hidden discrete logarithm problem”. In the case of subgroups of Cremona group DLP is closely connected with the following classical difficult mathematical problems: (1) solving the system of nonlinear polynomial equations over finite fields and rings, (2) problem of finding the inverse map of bijective polynomial multivariable map. The complexity of Discrete Logarithm Problem depends heavily from the choice of base. Generation of good ”pseudorandom” base guarantees the high complexity of (1) and (2) and security of algorithms based on corresponding DLP. We will use methods of theory of special combinatorial time dependent Vasyl Ustimenko · Urszula Romańczuk Maria Curie-Sk lodowska University in Lublin Pl. Marii Curie-Sk lodowskiej 5, Lublin, Poland http://www.umcs.lublin.pl
منابع مشابه
On the Comparison of Cryptographical Properties of Two Different Families of Graphs with Large Cycle Indicator
The paper is devoted to the implementations of the public key algorithms based on simple algebraic graphs A(n, K ) and D(n, K ) defined over the same finite commutative ring K . If K is a finite field both families are families of graphs with large cycle indicator. In fact, the family D(n, Fq) is a family of graphs of large girth (f.g.l.g.) with c = 1, their connected components C D(n, Fq) form...
متن کاملComparison of two Public Key Cryptosystems
Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...
متن کاملOn Two-parameter Dynamical Systems and Applications
In this note some useful properties of strongly continuous two-parameter semigroups of operators are studied, an exponential formula for two-parameter semigroups of operators on Banach spaces is obtained and some applied examples of two-parameter dynamical systems are discussed
متن کاملOn Extremal Graph Theory, Explicit Algebraic Constructions of Extremal Graphs and Corresponding Turing Encryption Machines
We observe recent results on the applications of extremal graph theory to cryptography. Classical Extremal Graph Theory contains Erdős Even Circuite Theorem and other remarkable results on the maximal size of graphs without certain cycles. Finite automaton is roughly a directed graph with labels on directed arrows. The most important advantage of Turing machine in comparison with finite automat...
متن کاملDynamical Behavior of a Rigid Body with One Fixed Point (Gyroscope). Basic Concepts and Results. Open Problems: a Review
The study of the dynamic behavior of a rigid body with one fixed point (gyroscope) has a long history. A number of famous mathematicians and mechanical engineers have devoted enormous time and effort to clarify the role of dynamic effects on its movement (behavior) – stable, periodic, quasi-periodic or chaotic. The main objectives of this review are: 1) to outline the characteristic features of...
متن کامل