Home Mathematics Two general schemes of algebraic cryptography
Article
Licensed
Unlicensed Requires Authentication

Two general schemes of algebraic cryptography

  • Vitaly Roman’kov ORCID logo EMAIL logo
Published/Copyright: October 11, 2018
Become an author with De Gruyter Brill

Abstract

In this paper, we introduce two general schemes of algebraic cryptography. We show that many of the systems and protocols considered in literature that use two-sided multiplications are specific cases of the first general scheme. In a similar way, we introduce the second general scheme that joins systems and protocols based on automorphisms or endomorphisms of algebraic systems. Also, we discuss possible applications of the membership search problem in algebraic cryptanalysis. We show how an efficient decidability of the underlined membership search problem for an algebraic system chosen as the platform can be applied to show a vulnerability of both schemes. Our attacks are based on the linear or on the nonlinear decomposition method, which complete each other. We give a couple of examples of systems and protocols known in the literature that use one of the two introduced schemes with their cryptanalysis. Mostly, these protocols simulate classical cryptographic schemes, such as Diffie–Hellman, Massey–Omura and ElGamal in algebraic setting. Furthermore, we show that, in many cases, one can break the schemes without solving the algorithmic problems on which the assumptions are based.

MSC 2010: 20F10; 94A60

Award Identifier / Grant number: 16-11-10002

Funding statement: This research was supported by Russian Science Foundation, project 16-11-10002.

Acknowledgements

The author is indebted to the reviewer for useful comments.

References

[1] M. Andrecut, A matrix public key cryptosystem, preprint (2015), https://arxiv.org/abs/1506.00277v1. Search in Google Scholar

[2] S. Baba, S. Kotyada and R. Teja, A non-abelian factorization problem and an associated cryptosystem, Cryptology EPrint Archive Report 2011/048 (2011), https://eprint.iacr.org/2011/048.pdf. 10.1088/1475-7516/2011/03/048Search in Google Scholar

[3] G. Baumslag, T. Camps, B. Fine, G. Rosenberger and X. Xu, Designing key transport protocols using combinatorial group theory, Algebraic Methods in Cryptography, Contemp. Math. 418, American Mathematical Society, Providence (2006), 35–43. 10.1090/conm/418/07944Search in Google Scholar

[4] V. D. Belousov, Foundations of the Quasigroups and Loops Theory (in Russian), Nauka, Moscow, 1967. Search in Google Scholar

[5] A. Ben-Zvi, A. Kalka and B. Tsaban, Cryptanalysis via algebraic spans, Cryptology ePrint Archive Report 2014/041 (2014), https://eprint.iacr.org/2014/041.pdf. 10.1007/978-3-319-96884-1_9Search in Google Scholar

[6] A. Ben-Zvi, A. Kalka and B. Tsaban, Cryptanalysis via algebraic spans, Advances in Cryptology—CRYPTO 2018, Lecture Notes in Comput. Sci. 10991, Springer, Berlin (2018), 1–20. 10.1007/978-3-319-96884-1_9Search in Google Scholar

[7] S. J. Bigelow, Braid groups are linear, J. Amer. Math. Soc. 14 (2001), no. 2, 471–486. 10.1090/S0894-0347-00-00361-1Search in Google Scholar

[8] S. R. Blackburn, C. Cid and C. Mullan, Cryptanalysis of three matrix-based key establishment protocols, J. Math. Cryptol. 5 (2011), no. 2, 159–168. 10.1515/jmc.2011.010Search in Google Scholar

[9] B. Cavallo and D. Kahrobaei, A family of polycyclic groups over which the uniform conjugacy problem is NP-complete, Internat. J. Algebra Comput. 24 (2014), no. 4, 515–530. 10.1142/S0218196714500234Search in Google Scholar

[10] J. H. Cheon and B. Jun, A polynomial time algorithm for the braid Diffie–Hellman conjugacy problem, Advances in Cryptology—CRYPTO 2003, Lecture Notes in Comput. Sci. 2729, Springer, Berlin (2003), 212–225. 10.1007/978-3-540-45146-4_13Search in Google Scholar

[11] B. Eick and D. Kahrobaei, Polycyclic groups: A new platform for cryptology?, preprint (2004), https://arxiv.org/abs/math/0411077v1. Search in Google Scholar

[12] D. Garber, D. Kahrobaei and H. T. Lam, Length-based attacks in polycyclic groups, J. Math. Cryptol. 9 (2015), no. 1, 33–43. 10.1515/jmc-2014-0003Search in Google Scholar

[13] A. Garreta, A. Miasnikov and D. Ovchinnikov, Random nilpotent groups, polycyclic presentations, and Diophantine problems, Groups Complex. Cryptol. 9 (2017), no. 2, 99–115. 10.1515/gcc-2017-0007Search in Google Scholar

[14] M. N. Gornova, E. G. Kukina and V. A. Roman’kov, Cryptanalysis of Ushakov–Shpilrain’s authentication protocol based on the twisted conjugacy problem (in Russian), Prikl. Diskr. Mat. (2015), no. 2(28), 46–53. 10.17223/20710410/28/5Search in Google Scholar

[15] A. B. Gribov, P. A. Zolotykh and A. V. Mikhalev, A construction of algebraic cryptosystem over the quasigroup ring (in Russian), Mat. Vopr. Kriptogr. 1 (2010), no. 4, 23–32. Search in Google Scholar

[16] J. Gryak and D. Kahrobaei, The status of polycyclic group-based cryptography: A survey and open problems, Groups Complex. Cryptol. 8 (2016), no. 2, 171–186. 10.1515/gcc-2016-0013Search in Google Scholar

[17] L. Gu, L. Wang, K. Ota, M. Dong, Z. Cao and Y. Yang, New public key cryptosystems based on non-abelian factorization problems, Secur. Commun. Netw. 6 (2013), no. 7, 912–922. 10.1002/sec.710Search in Google Scholar

[18] L. Gu and S. Zheng, Conjugacy systems based on nonabelian factorization problems and their applications in cryptography, J. Appl. Math. 2014 (2014), Article ID 630607. 10.1155/2014/630607Search in Google Scholar

[19] B. Hurley and T. Hurley, Group ring cryptography, Int. J. Pure Appl. Math. 69 (2011), no. 1, 67–86. Search in Google Scholar

[20] T. Hurley, Cryptographic schemes, key exchange, public key, preprint (2013), https://arxiv.org/abs/1305.4063v1. 10.12732/ijpam.v93i6.13Search in Google Scholar

[21] G. J. Janusz, Faithful representations of p groups at characteristic p. I, J. Algebra 15 (1970), 335–351. 10.1016/0021-8693(70)90063-3Search in Google Scholar

[22] D. Kahrobaei and V. Shpilrain, Using semidirect product of (semi)groups in public key cryptography, Pursuit of the Universal, Lecture Notes in Comput. Sci. 9709, Springer, Cham (2016), 132–141. 10.1007/978-3-319-40189-8_14Search in Google Scholar

[23] K. H. Ko, S. J. Lee, J. H. Cheon, J. W. Han, J.-S. Kang and C. Park, New public-key cryptosystem using braid groups, Advances in Cryptology—CRYPTO 2000 (Santa Barbara 2000), Lecture Notes in Comput. Sci. 1880, Springer, Berlin (2000), 166–183. 10.1007/3-540-44598-6_10Search in Google Scholar

[24] D. Krammer, Braid groups are linear, Ann. of Math. (2) 155 (2002), no. 1, 131–156. 10.2307/3062152Search in Google Scholar

[25] M. Kreuzer, A. D. Myasnikov and A. Ushakov, A linear algebra attack to group-ring-based key exchange protocols, Applied Cryptography and Network Security, Lecture Notes in Comput. Sci. 8479, Springer, Cham (2014), 37–43. 10.1007/978-3-319-07536-5_3Search in Google Scholar

[26] J. Macdonald, A. Miasnikov, A. Nikolaev and S. Vassileva, Logspace and compressed-word computations in nilpotent groups, preprint (2015), https://arxiv.org/abs/1503.03888. 10.1090/tran/8623Search in Google Scholar

[27] A. Mahalanobis, The Diffie–Hellman key exchange protocol and non-abelian nilpotent groups, Israel J. Math. 165 (2008), 161–187. 10.1007/s11856-008-1008-zSearch in Google Scholar

[28] V. T. Markov, A. V. Mikhalev, A. V. Gribov, P. A. Zolotykh and S. S. Skazhenik, Quasigroups and rings in coding theory and cryptography (in Russian), Appl. Discrete Math. (2012), no. 4(18), 31–52. 10.17223/20710410/18/3Search in Google Scholar

[29] G. Maze, C. Monico and J. Roshental, Diffie–Hellman a public key cryptosystem based on actions by semigroups, IEEE International Symposium on Information Theory (Lausanne 2002), IEEE Press, Piscataway (2012), 10.1109/ISIT.2002.1023538. 10.1109/ISIT.2002.1023538Search in Google Scholar

[30] A. Myasnikov and V. Roman’kov, A linear decomposition attack, Groups Complex. Cryptol. 7 (2015), no. 1, 81–94. 10.1515/gcc-2015-0007Search in Google Scholar

[31] A. Myasnikov, V. Shpilrain and A. Ushakov, Random subgroups of braid groups: An approach to cryptanalysis of a braid group based cryptographic protocol, Public Key Cryptography—PKC 2006, Lecture Notes in Comput. Sci. 3958, Springer, Berlin (2006), 302–314. 10.1007/11745853_20Search in Google Scholar

[32] A. Myasnikov, V. Shpilrain and A. Ushakov, Group-based Cryptography, Adv. Courses Math. CRM Barcelona, Birkhäuser, Basel, 2008. Search in Google Scholar

[33] A. Myasnikov, V. Shpilrain and A. Ushakov, Non-commutative Cryptography and Complexity of Group-theoretic Problems, Math. Surveys Monogr. 177, American Mathematical Society, Providence, 2011. 10.1090/surv/177Search in Google Scholar

[34] A. Myasnikov and A. Weiß, TC0 circuits for algorithmic problems in nilpotent groups, 42nd International Symposium on Mathematical Foundations of Computer Science, LIPIcs. Leibniz Int. Proc. Inform. 83, Leibniz-Zentrum für Informatik, Wadern (2017), Article ID 23. Search in Google Scholar

[35] A. D. Myasnikov and A. Ushakov, Length based attack and braid groups: Cryptanalysis of Anshel–Anshel–Goldfeld key exchange protocol, Public Key Cryptography—PKC 2007, Lecture Notes in Comput. Sci. 4450, Springer, Berlin (2007), 76–88. 10.1007/978-3-540-71677-8_6Search in Google Scholar

[36] A. G. Myasnikov and A. Ushakov, Random subgroups and analysis of the length-based and quotient attacks, J. Math. Cryptol. 2 (2008), no. 1, 29–61. 10.1515/JMC.2008.003Search in Google Scholar

[37] H. O. Pflugfelder, Quasigroups and Loops: Introduction, Sigma Ser. Pure Math. 7, Heldermann, Berlin, 1990. Search in Google Scholar

[38] V. Roman’kov, Equations over groups, Groups Complex. Cryptol. 4 (2012), no. 2, 191–239. 10.1515/gcc-2012-0015Search in Google Scholar

[39] V. Roman’kov, Introduction to Cryptography (in Russian), Moscow, Forum, 2012. Search in Google Scholar

[40] V. Roman’kov, Algebraic cryptography (in Russian), Omsk, Omsk State University, 2013. Search in Google Scholar

[41] V. A. Roman’kov, Cryptanalysis of some schemes applying automorphisms (in Russian), Prikl. Diskr. Mat. (2013), no. 3(21), 35–51. 10.17223/20710410/21/5Search in Google Scholar

[42] V. Roman’kov, A nonlinear decomposition attack, Groups Complex. Cryptol. 8 (2016), no. 2, 197–207. 10.1515/gcc-2016-0017Search in Google Scholar

[43] V. Roman’kov, A polynomial time algorithm for the braid double shielded public key cryptosystems, Bull. Karaganda Univ. Math. Ser. 84 (2016), no. 4, 110–115. 10.31489/2016M4/110-115Search in Google Scholar

[44] V. A. Roman’kov, A general encryption scheme using two-sided multiplications with its cryptanalysis, preprint (2017), https://arxiv.org/abs/1709.06282v1. Search in Google Scholar

[45] V. Roman’kov, Cryptanalysis of a combinatorial public key cryptosystem, Groups Complex. Cryptol. 9 (2017), no. 2, 125–135. 10.1515/gcc-2017-0013Search in Google Scholar

[46] V. A. Roman’kov and A. A. Obzor, A general algebraic cryptographic key exchange scheme and its cryptanalysis, Prikl. Diskr. Mat. (2017), no. 37, 52–61. 10.17223/20710410/37/4Search in Google Scholar

[47] S. K. Rososhek, Cryptosystems in automorphism groups of group rings of Abelian groups, J. Math. Sci. (N.Y.) 154 (2008), no. 3, 386–391. 10.1007/s10958-008-9168-2Search in Google Scholar

[48] V. Shpilrain, Cryptanalysis of Stickel’s key exchange scheme, Computer Science – Theory and Applications—CSR 2008, Lecture Notes in Comput. Sci. 4296, Springer, Berlin (2008), 283–288. 10.1007/978-3-540-79709-8_29Search in Google Scholar

[49] V. Shpilrain, Search and witness problems in group theory, Groups Complex. Cryptol. 2 (2010), no. 2, 231–246. 10.1515/gcc.2010.015Search in Google Scholar

[50] V. Shpilrain, Problems in group theory motivated by cryptography, preprint (2018), https://arxiv.org/abs/1802.07300. Search in Google Scholar

[51] V. Shpilrain and A. Ushakov, A new key exchange protocol based on the decomposition problem, Algebraic Methods in Cryptography, Contemp. Math. 418, American Mathematical Society, Providence (2006), 161–167. 10.1090/conm/418/07954Search in Google Scholar

[52] V. Shpilrain and G. Zapata, Using the subgroup membership search problem in public key cryptography, Algebraic Methods in Cryptography, Contemp. Math. 418, American Mathematical Society, Providence (2006), 169–178. 10.1090/conm/418/07955Search in Google Scholar

[53] J. D. H. Smith, An Introduction to Quasigroups and Their Representations, Stud. Adv. Math, Chapman & Hall/CRC, Boca Raton, 2007. Search in Google Scholar

[54] E. Stickel, A new method for exchanging secret keys, Third International Conference on Information Technology and Applications—ICITA’05, IEEE Press, Piscataway (2005), 426–430. 10.1109/ICITA.2005.33Search in Google Scholar

[55] B. Tsaban, Practical polynomial time solutions of several major problems in noncommutative-algebraic cryptography (preliminary announcement), IACR eprint (2014). Search in Google Scholar

[56] B. Tsaban, Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography, J. Cryptology 28 (2015), no. 3, 601–622. 10.1007/s00145-013-9170-9Search in Google Scholar

[57] L. Wang, L. Wang, Z. Cao, E. Okamoto and J. Shao, New constructions of public-key encryption schemes from conjugacy search problems, Information Security and Cryptology, Lecture Notes in Comput. Sci. 6584, Springer, Heidelberg (2011), 1–17. 10.1007/978-3-642-21518-6_1Search in Google Scholar

[58] X. Wang, C. Xu, G. Li, H. Lin and W. Wang, Double shielded public key cryptosystems, Cryptology ePrint Archive Report 2014/558 (2014), https://eprint.iacr.org/2014/558. Search in Google Scholar

Received: 2018-03-20
Published Online: 2018-10-11
Published in Print: 2018-11-01

© 2018 Walter de Gruyter GmbH, Berlin/Boston

Downloaded on 18.3.2026 from https://www.degruyterbrill.com/document/doi/10.1515/gcc-2018-0009/html
Scroll to top button