Crypto applications of combinatorial group theory

نویسندگان

  • Ivana Ilic
  • Spyros S. Magliveras
چکیده

The design of a large number of cryptographic primitives is based on the intractability of the traditional discrete logarithm problem (tDLP). However, the well known quantum algorithm of P. Shor [9] solves the tDLP in polynomial time, thus rendering all cryptographic schemes based on tDLP ineffective, should quantum computers become a practical reality. In [5] M. Sramka et al. generalize the DLP to arbitrary finite groups. The DLP for a non-abelian group is based on a particular representation of a chosen family of groups, and a choice of a class of generators for these groups. In this paper we show that for PSL(2, p) = 〈α, β〉, p an odd prime, certain choices of generators (α, β) must be avoided to insure that the resulting generalized DLP is indeed intractable. For other types of generating pairs we suggest possible cryptanalytic attacks, reducing the new problem to the earlier case. We note however that the probability of success is asymptotic to 1 p as p → ∞. The second part of the paper summarizes our successful attack of the SL(2, 2n) based Tillich Zémor cryptographic hash function [2], and show how to construct collisions between palindromic strings of length 2n+ 2. 2000 Mathematics Subject Classification: 68P25, 94A60.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Winner Determination in Combinatorial Auctions using Hybrid Ant Colony Optimization and Multi-Neighborhood Local Search

A combinatorial auction is an auction where the bidders have the choice to bid on bundles of items. The WDP in combinatorial auctions is the problem of finding winning bids that maximize the auctioneer’s revenue under the constraint that each item can be allocated to at most one bidder. The WDP is known as an NP-hard problem with practical applications like electronic commerce, production manag...

متن کامل

Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise

We propose constructions of fully homomorphic encryption completely different from the previous work, using special kinds of non-commutative finite groups. Unlike the existing schemes, our ciphertexts involve no “noise” terms, hence the inefficient “bootstrapping” procedures are not necessary. Our first scheme is based on improved results on embeddings of logic gates into (almost) simple groups...

متن کامل

Asymptotic behaviour of associated primes of monomial ideals with combinatorial applications

Let  $R$ be a commutative Noetherian ring and $I$ be an ideal of $R$. We say that $I$ satisfies the persistence property if  $mathrm{Ass}_R(R/I^k)subseteq mathrm{Ass}_R(R/I^{k+1})$ for all positive integers $kgeq 1$, which $mathrm{Ass}_R(R/I)$ denotes the set of associated prime ideals of $I$. In this paper, we introduce a class of square-free monomial ideals in the polynomial ring  $R=K[x_1,ld...

متن کامل

Combinatorial Representation Theory of Lie Algebras. Richard Stanley’s Work and the Way It Was Continued

Representation theory is a fundamental tool for studying group symmetry − geometric, analytic, or algebraic − by means of linear algebra, which has important applications to other areas of mathematics and mathematical physics. One very successful trend in this field in recent decades involves using combinatorial objects to model the representations, which allows one to apply combinatorial metho...

متن کامل

Crypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems

In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age.  To locate the issue in a historical perspective and in line with this strand of thought, we consid...

متن کامل

Threshold Ring Signatures and Applications to Ad-hoc Groups

In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et al.. at Asiacrypt ’01. We first improve on their ring signature paradigm by showing that it holds under a strictly weaker assumption, namely the random oracle model rather than the ideal cipher. Then we provide extensions to make ring signatures suitable in practical situations, such as threshold scheme...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011