Cryptography Based on Number Fields with Largeregulatorjohannes Buchmann

نویسندگان

  • JOHANNES BUCHMANN
  • MARKUS MAURER
چکیده

We explain a variant of the Fiat-Shamir identiication and signature protocol which is based on the intractability of computing generators of principal ideals in algebraic number elds. We also show how to use the Cohen-Lenstra-Martinet heuristics for class groups to construct number elds in which computing generators of principal ideals is intractable. 1. Introduction The security of public key cryptosystems is based on the intractability of computational problems in mathematics and in particular in number theory. Examples are the problems of factoring integers or computing discrete logarithms in certain nite abelian groups (see 23]). However, there is currently no such problem whose computational diiculty can be proved. On the contrary: Experience with the factoring problem shows that unexpected breakthroughs are always possible. To guarantee that public key cryptography is possible even if the currently used systems are broken , it is necessary to identify alternative computational problems which can be used as the basis of public key schemes. In this paper, we consider the principal ideal problem (PIP): Let O be an order of an algebraic number eld F. Given a principal O-ideal I, nd a generator

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography based on number fields with large regulator par

We explain a variant of the Fiat-Shamir identification and signature protocol that is based on the intractability of computing generators of principal ideals in algebraic number fields. We also show how to use the Cohen-Lenstra-Martinet heuristics for class groups to construct number fields in which computing generators of principal ideals is intractable.

متن کامل

On lower bounds for Information Set Decoding over Fq

Code-based cryptosystems are promising candidates for post-quantum cryptography. The increasing number of cryptographic schemes that are based on codes over fields different from F2 requires an analysis of their security. Information Set Decoding (ISD) is one of the most important generic attacks against code-based cryptosystems. We give lower bounds for ISD over Fq, thereby anticipating future...

متن کامل

Number field cryptography

This paper gives an overview of the state of art in cryptography based on quadratic orders. It discusses the intractable problems in class groups and the infrastructure of quadratic orders, approaches to the solution to these problems, and the crypto-systems employing them as underlying problems.

متن کامل

Design of low power random number generators for quantum-dot cellular automata

Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA.  Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...

متن کامل

Design of low power random number generators for quantum-dot cellular automata

Quantum-dot cellular automata (QCA) are a promising nanotechnology to implement digital circuits at the nanoscale. Devices based on QCA have the advantages of faster speed, lower power consumption, and greatly reduced sizes. In this paper, we are presented the circuits, which generate random numbers in QCA.  Random numbers have many uses in science, art, statistics, cryptography, gaming, gambli...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000