Onthe Group Based Cryptography
Onthe Group Based Cryptography
net/publication/271530240
CITATIONS READS
0 253
1 author:
Mehmet Kalkan
Nevşehir Hacı Bektaş Veli University
2 PUBLICATIONS 0 CITATIONS
SEE PROFILE
All content following this page was uploaded by Mehmet Kalkan on 22 October 2018.
Received: July 23, 2014 / Accepted: August 22, 2014 / Published: November 25, 2014.
Abstract: There are quite more applications of group theory. The recent application of group theory is public key (asymmetric)
cryptography. All cryptographic algorithms have some weaknesses. To avoid its weakness, some special groups and methods can
applied on. We will touch on group based public key cryptography and will give some suggestions in this area.
2.5 The Stickel Key Agreement Protocol Private Key: 𝑡𝑡, 𝑠𝑠 ∈ ℕ . Public Key: 𝐴𝐴 and 𝐴𝐴𝑡𝑡 ,
where 𝐴𝐴 ∈ 𝑆𝑆𝑆𝑆(𝑑𝑑, 𝑞𝑞).
Let 𝐺𝐺 = 𝐺𝐺𝐺𝐺(𝑛𝑛, 𝐹𝐹𝑞𝑞 ), and let 𝑔𝑔 ∈ 𝐺𝐺. Let 𝑎𝑎, 𝑏𝑏 ∈ 𝐺𝐺 of
Encryption.
order 𝑛𝑛𝑎𝑎 and 𝑛𝑛𝑏𝑏 respectively, and suppose that
(1) To send a plaintext 𝑣𝑣 ∈ 𝔽𝔽𝑑𝑑𝑞𝑞 , Bob computes 𝐴𝐴𝑠𝑠
𝑎𝑎𝑎𝑎 ≠ 𝑏𝑏𝑏𝑏. The group 𝐺𝐺 and 𝑎𝑎, 𝑏𝑏 are publicly known.
and 𝐴𝐴𝑡𝑡𝑡𝑡 for an arbitrary 𝑟𝑟 ∈ ℕ.
The procedure is as follows [4]:
(2) The cipher text is (𝐴𝐴𝑠𝑠 , 𝐴𝐴𝑡𝑡𝑡𝑡 𝑣𝑣 𝑇𝑇 ) where 𝑣𝑣 𝑇𝑇 is the
(1) Alice takes integers l, 𝑚𝑚 uniformly and
transpose of 𝑣𝑣.
randomly, where 0 < 𝑙𝑙 < 𝑛𝑛𝑎𝑎 and 0 < 𝑚𝑚 < 𝑛𝑛𝑏𝑏 . She
Decryption.
sends 𝑢𝑢 = 𝑎𝑎𝑙𝑙 𝑔𝑔𝑏𝑏𝑚𝑚 to Bob. 1. Alice knows 𝑚𝑚, when she receives the cipher
(2) Bob takes integers 𝑟𝑟, 𝑠𝑠 uniformly at random,
text (𝐴𝐴𝑠𝑠 , 𝐴𝐴𝑡𝑡𝑡𝑡 𝑣𝑣 𝑇𝑇 ) she computes 𝐴𝐴𝑡𝑡𝑡𝑡 from 𝐴𝐴𝑠𝑠 , then
where 0 < 𝑟𝑟 < 𝑛𝑛𝑎𝑎 and 0 < 𝑠𝑠 < 𝑛𝑛𝑏𝑏 . He sends 𝐴𝐴−𝑡𝑡𝑡𝑡 and then computes v from 𝐴𝐴𝑡𝑡𝑡𝑡 𝑣𝑣 𝑇𝑇 .
𝑣𝑣 = 𝑎𝑎𝑟𝑟 𝑔𝑔𝑏𝑏 𝑠𝑠 to Alice. He shows that the security of the El-Gamal
(3) Alice computes cryptosystem over 𝑆𝑆𝑆𝑆(𝑑𝑑, 𝑞𝑞) , is equivalent to the
𝑘𝑘𝑎𝑎 = 𝑎𝑎𝑙𝑙 𝑣𝑣𝑏𝑏𝑚𝑚 = 𝑎𝑎𝑙𝑙+𝑟𝑟 𝑔𝑔𝑏𝑏𝑚𝑚+𝑠𝑠 . Diffie-Hellman problem in 𝑆𝑆𝑆𝑆(𝑑𝑑, 𝑞𝑞).
Bob computes
𝑘𝑘𝑏𝑏 = 𝑎𝑎𝑟𝑟 𝑢𝑢𝑏𝑏 𝑠𝑠 = 𝑎𝑎𝑙𝑙+𝑟𝑟 𝑔𝑔𝑏𝑏𝑚𝑚 +𝑠𝑠 . 3. Some Problems
So they shared key as 3.1 DLP
𝐾𝐾 = 𝑘𝑘𝑎𝑎 = 𝑘𝑘𝑏𝑏 .
Here Discrete Logarithm Problem (DLP) can be
2.6 Diffie-Hellman KEP Using Matrices Over 𝑍𝑍𝑛𝑛 [𝑆𝑆𝑚𝑚 ] given as [4]; The cyclic group G with generator g is
given then for given ℎ ∈ 𝐺𝐺, find an element 𝑥𝑥 such
Kahrobaei et all, proposed to work with the group
that 𝑔𝑔 𝑥𝑥 = ℎ.
ring 𝑍𝑍₇[𝑆𝑆₅], which has the size 75! = 7¹²⁰ and the
semi group 𝑀𝑀₃(𝑍𝑍₇[𝑆𝑆₅]) of 3 × 3 matrices has the 3.2 The Conjugacy Search Problem
5!
order (7 )⁹ ≈ 10⁹¹³. They used this semi group of
Let 𝐺𝐺 be a non-abelian group. Let 𝑔𝑔, ℎ ∈ 𝐺𝐺 be
matrices as the platform of the key exchange protocol;
such that ℎ = 𝑔𝑔 𝑥𝑥 for some 𝑥𝑥 ∈ 𝐺𝐺 where the
(1) Alice chooses a public matrix 𝑀𝑀 ∈ 𝑀𝑀₃(𝑍𝑍₇[𝑆𝑆₅])
conjugate of g by 𝑥𝑥 is 𝑥𝑥⁻¹𝑔𝑔𝑔𝑔. Given the elements 𝑔𝑔
and a private large positive integer 𝑎𝑎, computes 𝑀𝑀𝑎𝑎 ,
and ℎ, find an element 𝑦𝑦 ∈ 𝐺𝐺 such that h = 𝑔𝑔 𝑦𝑦 .
and publishes (𝑀𝑀, 𝑀𝑀𝑎𝑎 ).
(2) Bob chooses another large integer 𝑏𝑏 , and 3.3 The Word Problem [3,6]
computes and publishes (𝑀𝑀𝑏𝑏 𝑏𝑏). The word 𝑤𝑤 is given in terms of generator of the
(3) Both Alice and Bob can now compute the same group 𝐺𝐺; find if 𝑤𝑤 = 1 ∈ 𝐺𝐺 in finitely tried steps.
shared secret key
𝐾𝐾 = (𝑀𝑀𝑎𝑎 )𝑏𝑏 = (𝑀𝑀𝑏𝑏 )𝑎𝑎 3.4 The Isomorphism Problem [6]
2.7 The El-Gamal over 𝑆𝑆𝑆𝑆(𝑑𝑑, 𝑞𝑞) Let 𝐺𝐺 and 𝐺𝐺′ be two presentations. Find in
finitely many times that the group 𝐺𝐺 is isomorphic to
Mahalanobis [17], discusses the discrete logarithm 𝐺𝐺′ or not.
problem in circulant matrices.
3.5 Generalized Conjugacy Search Problem[14]
Definition 2.1 A 𝑑𝑑 × 𝑑𝑑 matrix over a field 𝐹𝐹 is
called a circulant matrix, if every row except the first Given 𝑥𝑥, 𝑦𝑦 ∈ 𝐵𝐵𝑛𝑛 such that 𝑦𝑦 = 𝑎𝑎⁻¹𝑥𝑥𝑥𝑥 for some
row, is a right circular shift of the row above that. So a 𝑎𝑎 ∈ 𝐿𝐿𝐵𝐵𝑛𝑛 .
circulant matrix is defined by its first row. Find 𝑏𝑏 ∈ 𝐿𝐿𝐵𝐵𝑛𝑛 such that 𝑦𝑦 = 𝑏𝑏⁻¹𝑥𝑥𝑥𝑥.
On the Group Based Cryptography 713
3.6 Diffie-Hellman type Generalized Conjugacy (1) (𝐹𝐹, 𝐴𝐴) is said to be an identity soft group over
Search Problem[14] 𝐺𝐺 if 𝐹𝐹(𝑥𝑥) = {𝑒𝑒} for all 𝑥𝑥 ∈ 𝐴𝐴 , where 𝑒𝑒 is the
identity element of 𝐺𝐺.
Given 𝑥𝑥, 𝑦𝑦𝐴𝐴, 𝑦𝑦𝐵𝐵 ∈ B𝑛𝑛 such that 𝑦𝑦𝐴𝐴 = 𝑎𝑎⁻¹𝑥𝑥𝑥𝑥 and
(2) (𝐹𝐹, 𝐴𝐴) is said to be an absolute soft group over
𝑦𝑦𝐵𝐵 = 𝑏𝑏⁻¹𝑥𝑥𝑥𝑥 for some 𝑎𝑎 ∈ 𝐿𝐿𝐵𝐵𝑛𝑛 and 𝑏𝑏 ∈ 𝑈𝑈𝐵𝐵𝑛𝑛 .
𝐺𝐺 if 𝐹𝐹(𝑥𝑥) = 𝐺𝐺 for all 𝑥𝑥 ∈ 𝐴𝐴.
Find 𝑏𝑏⁻¹𝑦𝑦𝐴𝐴 𝑏𝑏 = 𝑎𝑎⁻¹𝑦𝑦𝐵𝐵 𝑎𝑎 = 𝑎𝑎⁻¹𝑏𝑏⁻¹𝑥𝑥𝑥𝑥𝑥𝑥.
Definition 4.5. Let (𝐹𝐹, 𝐴𝐴) and (𝐻𝐻, 𝐾𝐾) be two soft
3.7 Multiple Simultaneous Conjugacy Search groups over 𝐺𝐺. Then (𝐻𝐻, 𝐾𝐾) is a soft subgroup of
Problem[14] (𝐹𝐹, 𝐴𝐴), written as (𝐻𝐻, 𝐾𝐾) < (𝐹𝐹, 𝐴𝐴) ̃ , if
Given 𝑥𝑥𝑖𝑖 , 𝑦𝑦𝑖𝑖 ∈ 𝐵𝐵𝑁𝑁 , 1 ≤ 𝑖𝑖 ≤ 𝑡𝑡 such that 𝑦𝑦𝑖𝑖 = (1) 𝐾𝐾 ⊂ 𝐴𝐴,
𝑎𝑎⁻¹𝑥𝑥𝑖𝑖 𝑎𝑎 for some 𝑎𝑎 ∈ 𝐵𝐵𝑛𝑛 . (2) 𝐻𝐻(𝑥𝑥) is a subgroup of 𝐹𝐹(𝑥𝑥) for all 𝑥𝑥 ∈ 𝐾𝐾
Find 𝑏𝑏 ∈ 𝐵𝐵𝑛𝑛 such that 𝑦𝑦𝑖𝑖 = 𝑏𝑏⁻¹𝑥𝑥𝑖𝑖 𝑏𝑏 for all 𝑖𝑖. [19,24].
For more Braid group cryptography see [15]. Definition 4.6 Let (𝐹𝐹, 𝐴𝐴) be a soft group over 𝐺𝐺
and 𝑋𝑋 an element of 𝑃𝑃(𝐺𝐺). The set
4. Soft Cryptography {(𝑎𝑎, ⟨𝑥𝑥⟩) ∶ 𝐹𝐹(𝑎𝑎) = ⟨𝑥𝑥⟩, 𝑥𝑥 ∈ 𝑋𝑋}
The complicated problem in economics, is called a soft subset of (𝐹𝐹, 𝐴𝐴) generated by the set 𝑋𝑋
engineering, environment and computer cannot be and denoted by ⟨𝑋𝑋⟩. If (𝐹𝐹, 𝐴𝐴) = ⟨𝑋𝑋⟩, then the soft
successfully solved by using classical method because group (𝐹𝐹, 𝐴𝐴) is called the cyclic soft group generated
of various uncertainties [18]. But Molodtsov by 𝑋𝑋 [24].
successfully applied the soft theory into several area. If (𝐹𝐹, 𝐴𝐴) is a cyclic soft group over 𝐺𝐺, then we
Some basic notion of soft set theory [19] and soft have
groups [20, 21, 22, 24] are given. In most papers it has (𝐹𝐹, 𝐴𝐴) = {𝐹𝐹(𝑎𝑎) = ⟨𝑥𝑥⟩ ∶ 𝑎𝑎 ∈ 𝐴𝐴, 𝑥𝑥 ∈ 𝐺𝐺},
seen that using soft sets or soft groups provided a where {𝑥𝑥 ∈ 𝐺𝐺} is element of 𝑃𝑃(𝐺𝐺). That is to say, if
flexible qualification on that area. In our study, it will all the elements of (𝐹𝐹, 𝐴𝐴) are generated by any
be tried to apply soft structures to the cryptographic elements of 𝑋𝑋 of 𝑃𝑃(𝐺𝐺), then (𝐹𝐹, 𝐴𝐴) is a cyclic soft
problems and key exchange protocols. In this section, group over 𝐺𝐺.
the basic soft definitions will be given. If 𝐺𝐺 is a cyclic group, then (𝐹𝐹, 𝐴𝐴) is a soft cyclic
Definition 4.1 A pair (𝐹𝐹, 𝐸𝐸) is called a soft set group over 𝐺𝐺 since it has known that all subgroups of
over 𝑈𝑈 if and only if 𝐹𝐹 is a mapping of 𝐸𝐸 into the cyclic group are cyclic but the reverse is not always
set of all subsets of the set 𝑈𝑈. true.
Definition 4.2 Let (𝐹𝐹, 𝐴𝐴) be a soft set defined over Example 4.1 Let 𝐺𝐺 = 𝑆𝑆 3 be the symmetric group
the universe 𝑈𝑈. Then a soft matrix over (𝐹𝐹, 𝐴𝐴) is and 𝐴𝐴 = {𝑒𝑒, (12), (13), (23), (123)} the set of
denoted by [𝑀𝑀(𝐹𝐹, 𝐴𝐴)] is a matrix whose elements are parameters. If we construct a soft set (𝐹𝐹, 𝐴𝐴) over
the elements of the soft set (𝐹𝐹, 𝐴𝐴). Mathematically, 𝐺𝐺 such that 𝐹𝐹(𝑥𝑥) = {𝑦𝑦 ∈ 𝐺𝐺 ∶ 𝑦𝑦 = 𝑥𝑥𝑥𝑥, 𝑛𝑛 ∈ 𝑍𝑍} for
[𝑀𝑀(𝐹𝐹, 𝐴𝐴)] = 𝑚𝑚𝑖𝑖𝑖𝑖 where 𝑚𝑚𝑖𝑖𝑖𝑖 = 𝐹𝐹(𝛼𝛼) for some all 𝑥𝑥 ∈ 𝐴𝐴, then one can easily shows that (𝐹𝐹, 𝐴𝐴) is a
𝛼𝛼 ∈ 𝐴𝐴 [17,22]. soft cyclic group over 𝐺𝐺; however 𝐺𝐺 is not a cyclic
Definition 4.3 Let 𝐺𝐺 be a group and 𝐸𝐸 be a set of group [24].
parameters. For 𝐴𝐴 ⊆ E the pair (𝐹𝐹, 𝐴𝐴) is called a Theoretically, Diffie-Hellman Key Exchange
soft group over 𝐺𝐺 if and only if F(a) ≤ 𝐺𝐺 for all Protocol and Cyclic soft group can be combine as;
∈ 𝐴𝐴 , where 𝐹𝐹 is a mapping of 𝐴𝐴 into the set of all Let
subsets of 𝐺𝐺 [19]. {(𝑎𝑎𝑖𝑖 , ⟨𝑥𝑥⟩) ∶ 𝐹𝐹(𝑎𝑎𝑖𝑖 ) = ⟨𝑥𝑥⟩, 𝑥𝑥 ∈ 𝑋𝑋}
Definition 4.4 Considers the followings [19, 24]. be a soft subset of (𝐹𝐹, 𝐴𝐴) and let (𝐹𝐹, 𝐴𝐴) = ⟨𝑋𝑋⟩ be a
714 On the Group Based Cryptography