Commutative encryption method based on hidden logarithm problem
Автор: Moldovyan D.N., Moldovyan N.A., Moldovyan A.A.
Рубрика: Математическое моделирование
Статья в выпуске: 2 т.13, 2020 года.
Бесплатный доступ
A candidate for post-quantum commutative encryption algorithm is proposed, which is based on the hidden discrete logarithm problem defined in a new 6-dimensional finite non-commutative associative algebra. The properties of the algebra are investigated in detail and used in the design of the proposed commutative cipher. The formulas describing the set of p2 different global right-sided units contained in the algebra and local left-sided units are derived. Homomorphisms of two different types are considered and used in the commutative cipher. The encrypted message is represented in the form of a locally invertible element T of the algebra and encryption procedure includes performing the exponentiation operation and homomorphism map followed by the left-sided multiplication by a randomly selected local right-sided unit. The introduced commutative cipher is secure to the known-plaintext attacks and has been used to develop the post-quantum no-key encryption protocol providing possibility to send securely a secret message via a public channel without using any pre-agreed key. The proposed commutative encryption algorithm is characterized in using the single-use keys that are selected at random directly during the encryption process.
Commutative encryption, probabilistic cipher, post-quantum cryptoscheme, no-key protocol, finite non-commutative algebra, associative algebra, global unit, right-sided unit
Короткий адрес: https://sciup.org/147232989
IDR: 147232989 | DOI: 10.14529/mmp200205
Список литературы Commutative encryption method based on hidden logarithm problem
- Song Y. Yan. Quantum Computational Number Theory / Song Y. Yan. - N.Y.: Springer, 2015.
- Song Y. Yan. Quantum Attacks on Public-Key Cryptosystems / Song Y. Yan. - N.Y.: Springer, 2014.
- Shor, P.W. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on Quantum Computer / P.W. Shor // SIAM Journal of Computing. - 1997. - V. 26. - Р. 1484-1509.
- Moldovyan, D.N. Non-Commutative Finite Groups as Primitive of Public-Key Cryptoschemes / D.N. Moldovyan // Quasigroups and Related Systems. - 2010. - V. 18, № 2. - Р. 165-176.
- Kuzmin, A.S. Cryptographic Algorithms on Groups and Algebras / A.S. Kuzmin, V.T. Markov, A. A. Mikhalev, A. V. Mikhalev, A. A. Nechaev // Journal of Mathematical Sciences. - 2017. - V. 223, № 5. - Р. 629-641.
- Moldovyan, D.N. Cryptoschemes over Hidden Conjugacy Search Problem and Attacks Using Homomorphisms / D.N. Moldovyan, N.A. Moldovyan // Quasigroups Related Systems. - 2010. - V. 18, № 2. - Р. 177-186.
- Moldovyan, A.A. Post-Quantum Signature Algorithms Based on the Hidden Discrete Logarithm Problem / A.A. Moldovyan, N.A. Moldovyan // Computer Science Journal of Moldova. - 2018. - V. 26, № 3 (78). - Р. 301-313.
- Moldovyan, N.A. Finite Non-commutative Associative Algebras as Carriers of Hidden Discrete Logarithm Problem. / N.A. Moldovyan, A.A. Moldovyan // Bulletin of the South Ural State University. Series: Mathematical Modelling, Programming and Computer Software. - 2019. - V. 12, № 1. - Р. 66-81.
- Menezes, A.J. Applied cryptography / A.J. Menezes, P.C. Oorschot, S.A. Vanstone. - N.Y., London: CRC Press, 1996.
- Hellman, M.E., Pohlig, S.C. Exponentiation Cryptographic Apparatus and Method. U.S. Patent 4,424,414, 3 January 1984.