Algebraic cryptography: new constructions and their security against provable break?
نویسندگان
چکیده
Very few known cryptographic primitives are based on noncommutative algebra. Each new scheme is of substantial interest, because noncommutative constructions are secure agains many standard cryptographic attacks. On the other hand, cryptography does not provide security proofs that would allow to base the security of a cryptographic primitive on structural complexity assumptions. Thus, it is important to investigate weaker notions of security. In this paper we introduce new constructions of cryptographic primitives based on group invariants and o er new ways to strengthen them for practical use. Besides, we introduce the notion of provable break which is a weaker version of the regular cryptographic break. In this version, an adversary should have a proof that he has correctly decyphered the message. We prove that cryptosystems based on matrix groups invariants and a version of the Anshel-Anshel-Goldfeld key agreement protocol for modular groups are secure against provable break unless NP = RP. 1 Algebraic cryptography Public-key cryptography, since its very beginning [16, 53], has been actively employing algebraic constructions. The RSA protocol, for example, is based on number theory; the very construction of the protocol requires computing the Euler totient, φ(n). Its security is based on factoring a number into prime divisors, or, more precisely, on the hardness of the so-called 3⁄4RSA problem¿: nd roots of a given degree modulo a number n = pq, where p and q are prime (this task may not be equivalent to factoring; see [14,15,54] for more information). However, usually the term algebraic cryptography is used in a narrower meaning. Algebraic cryptography deals with constructions where encoding and decoding are both group homomorphisms. In [29] Grigoriev and Ponomarenko give the following de nition of a homomorphic cryptosystem (compare with De nition 2, where we introduce the general notion of a cryptosystem). De nition 1 Let H be a nite nonidentity group, G a nitely generated group, and f : G→ H an epimorphism. Assume that R is a set of distinct representatives of the right cosets of ? The research was done during the stay at the Max-Planck-Institut f ur Mathematik, Bonn, Germany. The second and third authors were supported in part by INTAS (YSF fellowship 05-109-5565) and RFBR (grants 05-01-00932, 06-01-00502).
منابع مشابه
Invariant-based Cryptosystems and Their Security Against Provable Worst-Case Break?
Cryptography based on noncommutative algebra still suffers from lack of schemes and lack of interest. In this work, we show new constructions of cryptosystems based on group invariants and suggest methods to make such cryptosystems secure in practice. Cryptographers still cannot prove security in its cryptographic sense or even reduce it to some statement about regular complexity classes. In th...
متن کاملCircular Chosen-Ciphertext Security with Compact Ciphertexts
A key-dependent message (KDM) secure encryption scheme is secure even if an adversary obtains encryptions of messages that depend on the secret key. Such key-dependent encryptions naturally occur in scenarios such as harddisk encryption, formal cryptography, or in specific protocols. However, there are not many provably secure constructions of KDM-secure encryption schemes. Moreover, only one c...
متن کاملSecure Message Authentication Against Related-Key Attack
Security against related-key attacks is an important criteria for modern cryptographic constructions. In the related-key setting, the adversary has the ability to query the underlying function on the target key as well as on some related-keys. Although provable security against related-key attack has received considerable attention in recent years, most of the results in the literature aim to a...
متن کاملA Lattice-Based Traitor Tracing Scheme
A traitor tracing scheme is a multi-receiver encryption scheme where malicious receiver coalitions aiming at building pirate decryption devices are deterred by the existence of a tracing algorithm: Using the pirate decryption device, the tracing algorithm can recover at least one member of the malicious coalition. All existing traitor tracing schemes rely either on rather inefficient generic co...
متن کاملStatistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives
Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks,...
متن کامل