An improvement of cryptographic schemes based on the conjugacy search problem | Applied Discrete Mathematics. Supplement. 2021. № 14. DOI: 10.17223/2226308X/14/25

An improvement of cryptographic schemes based on the conjugacy search problem

The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. It is considered as important part of cryptographic mechanism to protect secure communications between two parties. The Diffie - Hellman protocol, based on the discrete logarithm problem, which is generally difficult to solve, is the most well-known key exchange protocol. One of the possible generalizations of the discrete logarithm problem to arbitrary noncommutative groups is the so-called conjugacy search problem: given two elements g, h of a group G and the information that gx = h for some x G G, find at least one particular element x like that. Here gx stands for X-1gX. This problem is in the core of several known public key exchange protocols, most notably the one due to Anshel et al. and the other due to Ko et al. In recent years, effective algebraic cryptanalysis methods have been developed that have shown the vulnerability of protocols of this type. The main purpose of this short note is to describe a new tool to improve protocols based on the conjugacy search problem. This tool has been introduced by the author in some recent papers. It is based on a new mathematical concept of a marginal set.

Download file
Counter downloads: 30

Keywords

algorithm, marginal set, conjugacy searh problem, key exchange protocol, cryptography

Authors

NameOrganizationE-mail
Roman'kov V. A.Omsk State University F. M. Dostoevsky; Siberian Federal Universityromankov48@mail.ru
Всего: 1

References

Roman'kov V, A. Algebraic cryptanalysis and new security enhancement. Moscow J. Combinat. Number Theory, 2020, vol. 9, no. 2, pp. 123-146.
Roman'kov V. A. An improvement of the Diffie-Hellman noncommutative protocol. Designs, Codes, Cryptogr., to appear.
Ben-Zvi A., Kalka A., and Tsaban B. Cryptanalysis via algebraic span. LNCS, 2018, vol. 10991, pp. 255-274.
Roman'kov V. A. An improved version of the AAG cryptographic protocol. Groups, Complex., Cryptol., 2019, vol. 11, no. 1, pp. 35-42.
Tsaban B. Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography. J. Cryptol., 2015, vol. 28, no. 3, pp. 601-622.
Roman'kov V. A. Essays in Algebra and Cryptology: Algebraic Cryptanalysis. Omsk, Omsk State University Publ., 2018. 207p.
Roman'kov V. A. Kriptoanalis nekotorih shem ispolzujushih avtomorfizmi [Cryptanalysis of some schemes applying automorphisms]. Prikladnaya Discretnaya Matematika, 2013, no. 3, pp. 35-51. (in Russian)
Roman'kov V. A. A nonlinear decomposition attack. Groups, Complex., Cryptol., 2016, vol. 8, no. 2, pp. 197-207.
Roman'kov V. A. Algebraicheskaya kriptografiya [Algebraic Cryptography]. Omsk, Omsk State University Publ., 2013, 136 p. (in Russian)
Myasnikov A. G. and Roman'kov V. A. A linear decomposition attack. Groups, Complex., Cryptol., 2015, vol. 7, no. 1, pp. 81-94.
Diffie W. and Hellman M. I. New directions in cryptography. IEEE Trans. Inform. Theory, 1976, vol. 22, pp. 644-654.
Anshel I., Anshel M., and Goldfeld D. An algebraic method for public-key cryptography. Math. Res. Lett., 1999, vol. 6, no. 3, pp. 287-291.
Ko K. H., Lee S. J., Cheon J. H., et al. New public-key cryptosystem using braid groups. LNCS, 2000, vol. 1880, pp. 166-183.
 An improvement of cryptographic schemes based on the conjugacy search problem | Applied Discrete Mathematics. Supplement. 2021. № 14. DOI: 10.17223/2226308X/14/25

An improvement of cryptographic schemes based on the conjugacy search problem | Applied Discrete Mathematics. Supplement. 2021. № 14. DOI: 10.17223/2226308X/14/25

Download full-text version
Counter downloads: 494