Crypto applications of combinatorial group theory
نویسندگان
چکیده
The design of a large number of cryptographic primitives is based on the intractability of the traditional discrete logarithm problem (tDLP). However, the well known quantum algorithm of P. Shor [9] solves the tDLP in polynomial time, thus rendering all cryptographic schemes based on tDLP ineffective, should quantum computers become a practical reality. In [5] M. Sramka et al. generalize the DLP to arbitrary finite groups. The DLP for a non-abelian group is based on a particular representation of a chosen family of groups, and a choice of a class of generators for these groups. In this paper we show that for PSL(2, p) = 〈α, β〉, p an odd prime, certain choices of generators (α, β) must be avoided to insure that the resulting generalized DLP is indeed intractable. For other types of generating pairs we suggest possible cryptanalytic attacks, reducing the new problem to the earlier case. We note however that the probability of success is asymptotic to 1 p as p → ∞. The second part of the paper summarizes our successful attack of the SL(2, 2n) based Tillich Zémor cryptographic hash function [2], and show how to construct collisions between palindromic strings of length 2n+ 2. 2000 Mathematics Subject Classification: 68P25, 94A60.
منابع مشابه
Winner Determination in Combinatorial Auctions using Hybrid Ant Colony Optimization and Multi-Neighborhood Local Search
A combinatorial auction is an auction where the bidders have the choice to bid on bundles of items. The WDP in combinatorial auctions is the problem of finding winning bids that maximize the auctioneer’s revenue under the constraint that each item can be allocated to at most one bidder. The WDP is known as an NP-hard problem with practical applications like electronic commerce, production manag...
متن کاملCandidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise
We propose constructions of fully homomorphic encryption completely different from the previous work, using special kinds of non-commutative finite groups. Unlike the existing schemes, our ciphertexts involve no “noise” terms, hence the inefficient “bootstrapping” procedures are not necessary. Our first scheme is based on improved results on embeddings of logic gates into (almost) simple groups...
متن کاملAsymptotic behaviour of associated primes of monomial ideals with combinatorial applications
Let $R$ be a commutative Noetherian ring and $I$ be an ideal of $R$. We say that $I$ satisfies the persistence property if $mathrm{Ass}_R(R/I^k)subseteq mathrm{Ass}_R(R/I^{k+1})$ for all positive integers $kgeq 1$, which $mathrm{Ass}_R(R/I)$ denotes the set of associated prime ideals of $I$. In this paper, we introduce a class of square-free monomial ideals in the polynomial ring $R=K[x_1,ld...
متن کاملCombinatorial Representation Theory of Lie Algebras. Richard Stanley’s Work and the Way It Was Continued
Representation theory is a fundamental tool for studying group symmetry − geometric, analytic, or algebraic − by means of linear algebra, which has important applications to other areas of mathematics and mathematical physics. One very successful trend in this field in recent decades involves using combinatorial objects to model the representations, which allows one to apply combinatorial metho...
متن کاملCrypto Currencies and the Blockchain Technology: An Evolutionary Review of Money and the Payment Systems
In this paper we utilize the main findings from the recent literature to set the economic foundation for the existence of money, its modern interpretation as “memory” (Chokerlakota 1998) and how the Blockchain technology has empowered crypto currencies to perform this role in the information age. To locate the issue in a historical perspective and in line with this strand of thought, we consid...
متن کاملThreshold Ring Signatures and Applications to Ad-hoc Groups
In this paper, we investigate the recent paradigm for group signatures proposed by Rivest et al.. at Asiacrypt ’01. We first improve on their ring signature paradigm by showing that it holds under a strictly weaker assumption, namely the random oracle model rather than the ideal cipher. Then we provide extensions to make ring signatures suitable in practical situations, such as threshold scheme...
متن کامل