首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes 由已知n位s盒构造的(n + 1)位s盒的密码学性质
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-12-08 DOI: 10.1515/jmc-2020-0004
Yu Zhou, Daoguang Mu, Xinfeng Dong
Abstract S-box is the basic component of symmetric cryptographic algorithms, and its cryptographic properties play a key role in security of the algorithms. In this paper we give the distributions of Walsh spectrum and the distributions of autocorrelation functions for (n + 1)-bit S-boxes in [12]. We obtain the nonlinearity of (n + 1)-bit S-boxes, and one necessary and sufficient conditions of (n + 1)-bit S-boxes satisfying m-order resilient. Meanwhile, we also give one characterization of (n + 1)-bit S-boxes satisfying t-order propagation criterion. Finally, we give one relationship of the sum-of-squares indicators between an n-bit S-box S0 and the (n + 1)-bit S-box S (which is constructed by S0).
摘要S盒是对称密码算法的基本组成部分,其密码性质对算法的安全性起着关键作用。本文给出了文献[12]中(n+1)比特S盒的Walsh谱的分布和自相关函数的分布。我们得到了(n+1)比特S盒的非线性性,以及(n+1”比特S盒满足m阶弹性的一个充要条件。同时,我们还给出了满足t阶传播准则的(n+1)比特S盒的一个特征。最后,我们给出了n位S盒S0和(n+1)位S盒S(由S0构造)之间的平方和指示符的一个关系。
{"title":"On cryptographic properties of (n + 1)-bit S-boxes constructed by known n-bit S-boxes","authors":"Yu Zhou, Daoguang Mu, Xinfeng Dong","doi":"10.1515/jmc-2020-0004","DOIUrl":"https://doi.org/10.1515/jmc-2020-0004","url":null,"abstract":"Abstract S-box is the basic component of symmetric cryptographic algorithms, and its cryptographic properties play a key role in security of the algorithms. In this paper we give the distributions of Walsh spectrum and the distributions of autocorrelation functions for (n + 1)-bit S-boxes in [12]. We obtain the nonlinearity of (n + 1)-bit S-boxes, and one necessary and sufficient conditions of (n + 1)-bit S-boxes satisfying m-order resilient. Meanwhile, we also give one characterization of (n + 1)-bit S-boxes satisfying t-order propagation criterion. Finally, we give one relationship of the sum-of-squares indicators between an n-bit S-box S0 and the (n + 1)-bit S-box S (which is constructed by S0).","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"258 - 265"},"PeriodicalIF":1.2,"publicationDate":"2020-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41906582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The circulant hash revisited 再次访问循环哈希
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-12-03 DOI: 10.1515/jmc-2018-0054
Filipe Araújo, Samuel Neves
Abstract At ProvSec 2013, Minematsu presented the circulant hash, an almost-xor universal hash using only the xor and rotation operations. The circulant hash is a variant of Carter and Wegman’s H3 hash as well as Krawczyk’s Toeplitz hash, both of which are hashes based on matrix-vector multiplication over 𝔽2. In this paper we revisit the circulant hash and reinterpret it as a multiplication in the polynomial ring 𝔽2[x]/(xn + 1). This leads to simpler proofs, faster implementations in modern computer chips, and newer variants with practical implementation advantages.
在ProvSec 2013上,Minematsu提出了循环哈希,这是一种仅使用xor和旋转操作的几乎xor通用哈希。循环哈希是Carter和Wegman的H3哈希以及Krawczyk的Toeplitz哈希的一种变体,这两种哈希都是基于𝔽2上的矩阵向量乘法的哈希。在本文中,我们重新审视循环哈希,并将其重新解释为多项式环𝔽2[x]/(xn + 1)中的乘法。这导致更简单的证明,在现代计算机芯片中更快的实现,以及具有实际实现优势的新变体。
{"title":"The circulant hash revisited","authors":"Filipe Araújo, Samuel Neves","doi":"10.1515/jmc-2018-0054","DOIUrl":"https://doi.org/10.1515/jmc-2018-0054","url":null,"abstract":"Abstract At ProvSec 2013, Minematsu presented the circulant hash, an almost-xor universal hash using only the xor and rotation operations. The circulant hash is a variant of Carter and Wegman’s H3 hash as well as Krawczyk’s Toeplitz hash, both of which are hashes based on matrix-vector multiplication over 𝔽2. In this paper we revisit the circulant hash and reinterpret it as a multiplication in the polynomial ring 𝔽2[x]/(xn + 1). This leads to simpler proofs, faster implementations in modern computer chips, and newer variants with practical implementation advantages.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"250 - 257"},"PeriodicalIF":1.2,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2018-0054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42658851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attack on Kayawood protocol: uncloaking private keys Kayawood协议攻击:解锁私钥
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-12-01 DOI: 10.1515/jmc-2019-0015
M. Kotov, A. Menshov, A. Ushakov
Abstract We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an action (called E-multiplication) of a braid group on some finite set. The protocol assigns a secret element of a braid group to each party (private key). To disguise those elements, the protocol uses a so-called cloaking method that multiplies private keys on the left and on the right by specially designed elements (stabilizers for E-multiplication). We present a heuristic algorithm that allows a passive eavesdropper to recover Alice’s private key by removing cloaking elements. Our attack has 100% success rate on randomly generated instances of the protocol for the originally proposed parameter values and for recent proposals that suggest to insert many cloaking elements at random positions of the private key. Implementation of the attack is available on GitHub.
摘要本文分析了由I. Anshel、D. Atkins、D. Goldfeld和P. Gunnels提出的两方密钥协议Kayawood协议的安全特性。该协议的核心是在有限集合上的辫群的一个动作(称为e -乘法)。协议为每一方分配一个编织组的秘密元素(私钥)。为了掩饰这些元素,该协议使用了一种所谓的隐形方法,即通过特殊设计的元素(e -乘法的稳定器)在左侧和右侧复制私钥。我们提出了一种启发式算法,允许被动窃听者通过去除隐形元素来恢复Alice的私钥。针对最初提出的参数值和最近建议在私钥的随机位置插入许多隐形元素的提议,我们的攻击在随机生成的协议实例中有100%的成功率。攻击的实现可以在GitHub上获得。
{"title":"Attack on Kayawood protocol: uncloaking private keys","authors":"M. Kotov, A. Menshov, A. Ushakov","doi":"10.1515/jmc-2019-0015","DOIUrl":"https://doi.org/10.1515/jmc-2019-0015","url":null,"abstract":"Abstract We analyze security properties of a two-party key-agreement protocol recently proposed by I. Anshel, D. Atkins, D. Goldfeld, and P. Gunnels, called Kayawood protocol. At the core of the protocol is an action (called E-multiplication) of a braid group on some finite set. The protocol assigns a secret element of a braid group to each party (private key). To disguise those elements, the protocol uses a so-called cloaking method that multiplies private keys on the left and on the right by specially designed elements (stabilizers for E-multiplication). We present a heuristic algorithm that allows a passive eavesdropper to recover Alice’s private key by removing cloaking elements. Our attack has 100% success rate on randomly generated instances of the protocol for the originally proposed parameter values and for recent proposals that suggest to insert many cloaking elements at random positions of the private key. Implementation of the attack is available on GitHub.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"237 - 249"},"PeriodicalIF":1.2,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0015","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41413901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic 离散对数介质特性的三维点阵筛分
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-25 DOI: 10.1515/jmc-2020-0008
G. McGuire, Oisín Robinson
Abstract Lattice sieving in two dimensions has proven to be an indispensable practical aid in integer factorization and discrete log computations involving the number field sieve. The main contribution of this article is to show that a different method of lattice sieving in three dimensions will provide a significant speedup in medium characteristic. Our method is to use the successive minima and shortest vectors of the lattice instead of transition vectors to iterate through lattice points. We showcase the new method by a record computation in a 133-bit subgroup of Fp6 ${{mathbb{F}}_{{{p}^{6}}}}$, with p6 having 423 bits. Our overall timing is nearly 3 times faster than the previous record of a 132-bit subgroup in a 422-bit field. The approach generalizes to dimensions 4 or more, overcoming one key obstruction to the implementation of the tower number field sieve.
二维点阵筛分已被证明是涉及数域筛分的整数分解和离散对数计算中不可缺少的实用工具。本文的主要贡献是表明,在三维晶格筛分的不同方法将提供一个显着的加速介质特性。我们的方法是使用格点的连续最小和最短向量代替过渡向量来迭代格点。我们通过Fp6 ${{mathbb{F}}_{{p}^{6}}}}$的133位子组中的记录计算来展示新方法,其中p6具有423位。我们的总体时间比之前在422位字段中记录的132位子组快了近3倍。该方法可推广到4或更多维度,克服了塔数场筛实施的一个关键障碍。
{"title":"Lattice Sieving in Three Dimensions for Discrete Log in Medium Characteristic","authors":"G. McGuire, Oisín Robinson","doi":"10.1515/jmc-2020-0008","DOIUrl":"https://doi.org/10.1515/jmc-2020-0008","url":null,"abstract":"Abstract Lattice sieving in two dimensions has proven to be an indispensable practical aid in integer factorization and discrete log computations involving the number field sieve. The main contribution of this article is to show that a different method of lattice sieving in three dimensions will provide a significant speedup in medium characteristic. Our method is to use the successive minima and shortest vectors of the lattice instead of transition vectors to iterate through lattice points. We showcase the new method by a record computation in a 133-bit subgroup of Fp6 ${{mathbb{F}}_{{{p}^{6}}}}$, with p6 having 423 bits. Our overall timing is nearly 3 times faster than the previous record of a 132-bit subgroup in a 422-bit field. The approach generalizes to dimensions 4 or more, overcoming one key obstruction to the implementation of the tower number field sieve.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"223 - 236"},"PeriodicalIF":1.2,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0008","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45525006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Pseudo-free families of computational universal algebras 计算泛代数的无伪族
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-25 DOI: 10.1515/jmc-2020-0014
M. Anokhin
Abstract Let Ω be a finite set of finitary operation symbols. We initiate the study of (weakly) pseudo-free families of computational Ω-algebras in arbitrary varieties of Ω-algebras. A family (Hd | d ∈ D) of computational Ω-algebras (where D ⊆ {0, 1}*) is called polynomially bounded (resp., having exponential size) if there exists a polynomial η such that for all d ∈ D, the length of any representation of every h ∈ Hd is at most η(|d|)( resp., |Hd|≤2η(|d|)). $eta (|d|)left( text{ resp}text{., }left| {{H}_{d}} right|le {{2}^{eta (|d|)}} right).$ First, we prove the following trichotomy: (i) if Ω consists of nullary operation symbols only, then there exists a polynomially bounded pseudo-free family; (ii) if Ω = Ω0 ∪ {ω}, where Ω0 consists of nullary operation symbols and the arity of ω is 1, then there exist an exponential-size pseudo-free family and a polynomially bounded weakly pseudo-free family; (iii) in all other cases, the existence of polynomially bounded weakly pseudo-free families implies the existence of collision-resistant families of hash functions. In this trichotomy, (weak) pseudo-freeness is meant in the variety of all Ω-algebras. Second, assuming the existence of collision-resistant families of hash functions, we construct a polynomially bounded weakly pseudo-free family and an exponential-size pseudo-free family in the variety of all m-ary groupoids, where m is an arbitrary positive integer.
设Ω是有限运算符号的有限集合。我们开始研究(弱)伪自由族的计算Ω-algebras的任意变种Ω-algebras。计算式Ω-algebras(其中d∈0,1}*)的族(Hd | d∈d)称为多项式有界(p. 0)。如果存在一个多项式η,使得对于所有d∈d,每个h∈Hd的任何表示的长度最多为η(|d|)(resp., |Hd|≤2η(|d|))。$eta (|d|)left(text{resp}text{;,} | {{H} _ {d}} 右| le{{2} ^{埃塔(| |)}}右)。首先,我们证明了以下三分法:(i)如果Ω只由非整数运算符号组成,则存在一个多项式有界的伪无族;(ii)若Ω = Ω0∪{Ω},其中Ω0由虚运算符号组成,且Ω的元数为1,则存在一个指数大小的伪自由族和一个多项式有界的弱伪自由族;(iii)在所有其他情况下,多项式有界弱伪自由族的存在意味着哈希函数的抗碰撞族的存在。在这个三分法中,(弱)伪自由是指所有Ω-algebras的变化。其次,假设哈希函数的抗碰撞族存在,我们构造了一个多项式有界的弱伪自由族和一个指数大小的伪自由族,其中m是任意正整数。
{"title":"Pseudo-free families of computational universal algebras","authors":"M. Anokhin","doi":"10.1515/jmc-2020-0014","DOIUrl":"https://doi.org/10.1515/jmc-2020-0014","url":null,"abstract":"Abstract Let Ω be a finite set of finitary operation symbols. We initiate the study of (weakly) pseudo-free families of computational Ω-algebras in arbitrary varieties of Ω-algebras. A family (Hd | d ∈ D) of computational Ω-algebras (where D ⊆ {0, 1}*) is called polynomially bounded (resp., having exponential size) if there exists a polynomial η such that for all d ∈ D, the length of any representation of every h ∈ Hd is at most η(|d|)( resp., |Hd|≤2η(|d|)). $eta (|d|)left( text{ resp}text{., }left| {{H}_{d}} right|le {{2}^{eta (|d|)}} right).$ First, we prove the following trichotomy: (i) if Ω consists of nullary operation symbols only, then there exists a polynomially bounded pseudo-free family; (ii) if Ω = Ω0 ∪ {ω}, where Ω0 consists of nullary operation symbols and the arity of ω is 1, then there exist an exponential-size pseudo-free family and a polynomially bounded weakly pseudo-free family; (iii) in all other cases, the existence of polynomially bounded weakly pseudo-free families implies the existence of collision-resistant families of hash functions. In this trichotomy, (weak) pseudo-freeness is meant in the variety of all Ω-algebras. Second, assuming the existence of collision-resistant families of hash functions, we construct a polynomially bounded weakly pseudo-free family and an exponential-size pseudo-free family in the variety of all m-ary groupoids, where m is an arbitrary positive integer.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"197 - 222"},"PeriodicalIF":1.2,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0014","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43706806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE 一个框架,用于减少与Grover算法一起使用的量子oracle的开销,用于SIKE的密码分析
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0080
Jean-François Biasse, Benjamin Pring
Abstract In this paper we provide a framework for applying classical search and preprocessing to quantum oracles for use with Grover’s quantum search algorithm in order to lower the quantum circuit-complexity of Grover’s algorithm for single-target search problems. This has the effect (for certain problems) of reducing a portion of the polynomial overhead contributed by the implementation cost of quantum oracles and can be used to provide either strict improvements or advantageous trade-offs in circuit-complexity. Our results indicate that it is possible for quantum oracles for certain single-target preimage search problems to reduce the quantum circuit-size from O 2 n / 2 ⋅ m C $Oleft(2^{n/2}cdot mCright)$ (where C originates from the cost of implementing the quantum oracle) to O ( 2 n / 2 ⋅ m C ) $O(2^{n/2} cdot msqrt{C})$ without the use of quantum ram, whilst also slightly reducing the number of required qubits. This framework captures a previous optimisation of Grover’s algorithm using preprocessing [21] applied to cryptanalysis, providing new asymptotic analysis. We additionally provide insights and asymptotic improvements on recent cryptanalysis [16] of SIKE [14] via Grover’s algorithm, demonstrating that the speedup applies to this attack and impacting upon quantum security estimates [16] incorporated into the SIKE specification [14].
摘要在本文中,我们提供了一个将经典搜索和预处理应用于量子预言机的框架,用于Grover的量子搜索算法,以降低Grover算法在单目标搜索问题上的量子电路复杂性。这具有减少由量子预言机的实现成本贡献的多项式开销的一部分的效果(对于某些问题),并且可以用于在电路复杂性方面提供严格的改进或有利的权衡。我们的结果表明,对于某些单目标预图像搜索问题的量子预言机,在不使用量子ram的情况下,可以将量子电路大小从O 2 n/2·m C$Oleft(2^{n/2}cdot-mCright)$(其中C源于实现量子预言机的成本)减小到O(2 n/2∙m C)$O(2^},同时还略微减少了所需量子位的数量。该框架利用应用于密码分析的预处理[21]捕获了Grover算法的先前优化,提供了新的渐近分析。此外,我们还通过Grover算法对最近对SIKE[14]的密码分析[16]进行了深入了解和渐进改进,证明了加速适用于这种攻击,并影响了纳入SIKE规范[14]的量子安全估计[16]。
{"title":"A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKE","authors":"Jean-François Biasse, Benjamin Pring","doi":"10.1515/jmc-2020-0080","DOIUrl":"https://doi.org/10.1515/jmc-2020-0080","url":null,"abstract":"Abstract In this paper we provide a framework for applying classical search and preprocessing to quantum oracles for use with Grover’s quantum search algorithm in order to lower the quantum circuit-complexity of Grover’s algorithm for single-target search problems. This has the effect (for certain problems) of reducing a portion of the polynomial overhead contributed by the implementation cost of quantum oracles and can be used to provide either strict improvements or advantageous trade-offs in circuit-complexity. Our results indicate that it is possible for quantum oracles for certain single-target preimage search problems to reduce the quantum circuit-size from O 2 n / 2 ⋅ m C $Oleft(2^{n/2}cdot mCright)$ (where C originates from the cost of implementing the quantum oracle) to O ( 2 n / 2 ⋅ m C ) $O(2^{n/2} cdot msqrt{C})$ without the use of quantum ram, whilst also slightly reducing the number of required qubits. This framework captures a previous optimisation of Grover’s algorithm using preprocessing [21] applied to cryptanalysis, providing new asymptotic analysis. We additionally provide insights and asymptotic improvements on recent cryptanalysis [16] of SIKE [14] via Grover’s algorithm, demonstrating that the speedup applies to this attack and impacting upon quantum security estimates [16] incorporated into the SIKE specification [14].","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"143 - 156"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0080","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42761476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Algebraic approaches for solving isogeny problems of prime power degrees 求解素数幂次等根问题的代数方法
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0072
Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, K. Yokoyama
Abstract Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach seems the most practical to solve isogeny problems with classical computers. In this paper, we propose two algebraic approaches for isogeny problems of prime power degrees. Our strategy is to reduce isogeny problems to a system of algebraic equations, and to solve it by Gröbner basis computation. The first one uses modular polynomials, and the second one uses kernel polynomials of isogenies. We report running times for solving isogeny problems of 3-power degrees on supersingular elliptic curves over 𝔽p2 with 503-bit prime p, extracted from the NIST PQC candidate SIKE. Our experiments show that our first approach is faster than the meet-in-the-middle approach for isogeny degrees up to 310.
近年来,超奇异同基因密码系统作为后量子密码学(PQC)的候选方案受到了广泛的关注。它们的安全性依赖于求解超奇异椭圆曲线等构问题的难度。用经典计算机解决等同源性问题,中间相遇方法似乎是最实用的。本文给出了素幂次等同根问题的两种代数方法。我们的策略是将等基因问题简化为代数方程系统,并通过Gröbner基计算来解决它。第一个用模多项式,第二个用同基因核多项式。我们报告了用503位素数p在𝔽p2上求解超奇异椭圆曲线上3次幂问题的运行时间,该素数p提取自NIST PQC候选程序SIKE。我们的实验表明,我们的第一种方法比中间相遇方法更快,等同源度高达310。
{"title":"Algebraic approaches for solving isogeny problems of prime power degrees","authors":"Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, K. Yokoyama","doi":"10.1515/jmc-2020-0072","DOIUrl":"https://doi.org/10.1515/jmc-2020-0072","url":null,"abstract":"Abstract Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach seems the most practical to solve isogeny problems with classical computers. In this paper, we propose two algebraic approaches for isogeny problems of prime power degrees. Our strategy is to reduce isogeny problems to a system of algebraic equations, and to solve it by Gröbner basis computation. The first one uses modular polynomials, and the second one uses kernel polynomials of isogenies. We report running times for solving isogeny problems of 3-power degrees on supersingular elliptic curves over 𝔽p2 with 503-bit prime p, extracted from the NIST PQC candidate SIKE. Our experiments show that our first approach is faster than the meet-in-the-middle approach for isogeny degrees up to 310.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"31 - 44"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0072","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44685624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Editor’s Preface for the Second Annual MathCrypt Proceedings Volume 《数学密码》第二卷编辑前言
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0170
J. Cheon, K. Lauter, Yongsoo Song
In 2017, we decided to start the annual series of MathCryptWorkshops in order to encouragemore mathematicians and computational number theorists to propose and work on hard problems in cryptography. This is the second volume of papers from our second annual MathCrypt conference hosted at Crypto 2019, on August 19, 2019 in Santa Barbara. We were motivated to launch this series of workshops to attract more mathematicians to work on hard problems in cryptography. There is a gap in the publishing culture between mathematics and computer science which we hope to bridge with this effort. Mathematicians primarily recognize publications in journals, whereas cryptographers almost always publish their results quickly in proceedings volumes of conferences which are the most prestigious venues for the research area. Many mathematicians are not accustomed to the model of submitting a paper by the conference deadline, presenting the work at the conference, and publishing in the proceedings volume. We wanted to provide a regular annual venue for mathematicians to contribute to the cryptographic research community at this accelerated pace, and the Journal ofMathematical Cryptology was an ideal place and a willing partner to create this opportunity. We are at a point in time where it is increasingly important for mathematicians to be involved in cryptography research, as we set out to determine the next generation of cryptographic systems based on hard math problems which can withstand attacks from a quantum computer once it is built. In 2017, NIST launched a 5-year international competition to determine post-quantum cryptosystems (PQC). MathCrypt can play a complimentary role by encouraging mathematicians to work on and publish attacks on new proposals, including both preliminary results and also even results which represent the failure of a certain approach to effectively attack a new system. This creates the culture of sharing information on approacheswhichhave been tried and theirmeasure of success. Currently there is such ahigh bar for publishing papers with new attacks. Attacking the underlying hardmath problems in cryptography is an extremely challenging endeavor, and so the incentives are not aligned to encourage new researchers and young researchers to work and commit themselves to this direction. The opportunity to publish intermediate results in venues like MathCrypt should help to de-risk this endeavor and encourage more mathematician to pursue these research directions. The MathCrypt proceedings volumes are also intended as a place to publish proposals for new cryptographic systems based on new ideas for hard math problems. The post quantum era provides both an opportunity and a challenge tomathematicians to create new systems based on new ideas.When an idea for a hard math problem is first proposed, it can be hard to evaluate the long-term potential in the span of a few weeks during a short review cycle. Thus more established venues may be reluctant
2017年,我们决定开始一年一度的mathcryptworkshop系列,以鼓励更多的数学家和计算数论学家提出和研究密码学中的难题。这是2019年8月19日在圣巴巴拉举行的Crypto 2019年第二届MathCrypt年度会议的第二卷论文。我们发起这一系列的研讨会是为了吸引更多的数学家来研究密码学中的难题。在数学和计算机科学之间的出版文化存在着差距,我们希望通过这一努力来弥合这一差距。数学家主要在期刊上发表论文,而密码学家几乎总是在研究领域最负盛名的会议论文集中迅速发表他们的成果。许多数学家不习惯在会议截止日期前提交论文,在会议上展示工作,并在会议文集中发表的模式。我们希望为数学家提供一个定期的年度场所,以加快速度为密码学研究社区做出贡献,而《数学密码学杂志》是一个理想的地方,也是一个愿意创造这个机会的合作伙伴。我们正处在这样一个时刻,数学家参与密码学研究变得越来越重要,因为我们正着手确定基于硬数学问题的下一代密码系统,这些系统一旦建成,就可以抵御量子计算机的攻击。2017年,NIST发起了一项为期5年的国际竞赛,以确定后量子密码系统(PQC)。MathCrypt可以通过鼓励数学家研究和发布对新提案的攻击来发挥互补作用,包括初步结果,甚至是代表某种方法无法有效攻击新系统的结果。这创造了一种文化,即分享已经尝试过的方法及其成功衡量标准的信息。目前,发表带有新攻击的论文有很高的门槛。攻克密码学中潜在的数学难题是一项极具挑战性的工作,因此,激励机制并没有与鼓励新研究人员和年轻研究人员在这个方向上工作并致力于此。在MathCrypt这样的平台上发表中间结果的机会应该有助于降低这种努力的风险,并鼓励更多的数学家追求这些研究方向。MathCrypt论文集卷也打算作为一个地方,发布基于新思想的新密码系统对困难的数学问题的建议。后量子时代为数学家们创造基于新思想的新系统提供了机遇和挑战。当一个困难的数学问题的想法第一次被提出时,在一个短暂的审查周期中,很难在几周的时间内评估其长期潜力。因此,较成熟的机构可能不愿意在竞争激烈的过程中接受这类论文,因为如果它们在相对较短的时间内被发现是薄弱的提案,它们可能被视为一种风险。MathCrypt为讨论和发布新提案提供了一个论坛和社区。存在大量的资助机会,例如美国国家科学基金会(NSF) SaTC网络安全计划,以及新系统和数学密码学研究的提案
{"title":"Editor’s Preface for the Second Annual MathCrypt Proceedings Volume","authors":"J. Cheon, K. Lauter, Yongsoo Song","doi":"10.1515/jmc-2020-0170","DOIUrl":"https://doi.org/10.1515/jmc-2020-0170","url":null,"abstract":"In 2017, we decided to start the annual series of MathCryptWorkshops in order to encouragemore mathematicians and computational number theorists to propose and work on hard problems in cryptography. This is the second volume of papers from our second annual MathCrypt conference hosted at Crypto 2019, on August 19, 2019 in Santa Barbara. We were motivated to launch this series of workshops to attract more mathematicians to work on hard problems in cryptography. There is a gap in the publishing culture between mathematics and computer science which we hope to bridge with this effort. Mathematicians primarily recognize publications in journals, whereas cryptographers almost always publish their results quickly in proceedings volumes of conferences which are the most prestigious venues for the research area. Many mathematicians are not accustomed to the model of submitting a paper by the conference deadline, presenting the work at the conference, and publishing in the proceedings volume. We wanted to provide a regular annual venue for mathematicians to contribute to the cryptographic research community at this accelerated pace, and the Journal ofMathematical Cryptology was an ideal place and a willing partner to create this opportunity. We are at a point in time where it is increasingly important for mathematicians to be involved in cryptography research, as we set out to determine the next generation of cryptographic systems based on hard math problems which can withstand attacks from a quantum computer once it is built. In 2017, NIST launched a 5-year international competition to determine post-quantum cryptosystems (PQC). MathCrypt can play a complimentary role by encouraging mathematicians to work on and publish attacks on new proposals, including both preliminary results and also even results which represent the failure of a certain approach to effectively attack a new system. This creates the culture of sharing information on approacheswhichhave been tried and theirmeasure of success. Currently there is such ahigh bar for publishing papers with new attacks. Attacking the underlying hardmath problems in cryptography is an extremely challenging endeavor, and so the incentives are not aligned to encourage new researchers and young researchers to work and commit themselves to this direction. The opportunity to publish intermediate results in venues like MathCrypt should help to de-risk this endeavor and encourage more mathematician to pursue these research directions. The MathCrypt proceedings volumes are also intended as a place to publish proposals for new cryptographic systems based on new ideas for hard math problems. The post quantum era provides both an opportunity and a challenge tomathematicians to create new systems based on new ideas.When an idea for a hard math problem is first proposed, it can be hard to evaluate the long-term potential in the span of a few weeks during a short review cycle. Thus more established venues may be reluctant","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"1 - 3"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0170","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48389877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a Ring Analogue of the Leftover Hash Lemma 关于剩余哈希引理的环类比
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0076
D. Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
Abstract The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is far from a field, which is typical for efficient cryptosystems. Lyubashevsky et al. (Eurocrypt ’13) proved a “regularity lemma,” which can be used instead of the LHL, but applies only for Gaussian inputs. This is in contrast to the LHL, which applies when the input is drawn from any high min-entropy distribution. Our work presents an approach for generalizing the “regularity lemma” of Lyubashevsky et al. to certain conditional distributions. We assume the input was sampled from a discrete Gaussian distribution and consider the induced distribution, given side-channel leakage on the input. We present three instantiations of our approach, proving that the regularity lemma holds for three natural conditional distributions.
摘要剩余哈希引理(LHL)用于分析各种基于格的密码系统,如Regev和Dual-Regev加密方案以及它们的防泄漏对应物。当环远离字段时,LHL在环设置中不成立,这对于有效的密码系统来说是典型的。Lyubashevsky等人(Eurocrypt ' 13)证明了一个“正则引理”,它可以用来代替LHL,但只适用于高斯输入。这与LHL相反,LHL适用于输入来自任何高最小熵分布的情况。我们的工作提出了一种将Lyubashevsky等人的“正则引理”推广到某些条件分布的方法。我们假设输入从离散高斯分布中采样,并考虑在输入上给定侧通道泄漏的诱导分布。我们给出了我们方法的三个实例,证明了正则引理适用于三个自然条件分布。
{"title":"Towards a Ring Analogue of the Leftover Hash Lemma","authors":"D. Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi","doi":"10.1515/jmc-2020-0076","DOIUrl":"https://doi.org/10.1515/jmc-2020-0076","url":null,"abstract":"Abstract The leftover hash lemma (LHL) is used in the analysis of various lattice-based cryptosystems, such as the Regev and Dual-Regev encryption schemes as well as their leakage-resilient counterparts. The LHL does not hold in the ring setting, when the ring is far from a field, which is typical for efficient cryptosystems. Lyubashevsky et al. (Eurocrypt ’13) proved a “regularity lemma,” which can be used instead of the LHL, but applies only for Gaussian inputs. This is in contrast to the LHL, which applies when the input is drawn from any high min-entropy distribution. Our work presents an approach for generalizing the “regularity lemma” of Lyubashevsky et al. to certain conditional distributions. We assume the input was sampled from a discrete Gaussian distribution and consider the induced distribution, given side-channel leakage on the input. We present three instantiations of our approach, proving that the regularity lemma holds for three natural conditional distributions.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"87 - 110"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0076","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42587508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Discretisation and Product Distributions in Ring-LWE 环- lwe中的离散化与产品分布
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0073
S. Murphy, Rachel Player
Abstract A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for degree-1 and degree-2 ciphertexts in the homomorphic encryption scheme of Lyubashevsky, Peikert and Regev (IACR eprint 2013/293). In this paper, we clarify and extend results presented by Murphy and Player. Firstly, we make precise the approximation of the discretisation of a Normal random variable as a Normal random variable, as used in the encryption process of Lyubashevsky, Peikert and Regev. Secondly, we show how to extend the analysis given by Murphy and Player to degree-k ciphertexts, by precisely characterising the distribution of the noise in these ciphertexts.
Murphy和Player提出了一个适用于Ring-LWE的统计框架(IACR eprint 2019/452)。通过分析Lyubashevsky, Peikert和Regev (IACR eprint 2013/293)的同态加密方案中1级和2级密文的解密失败概率,证明了其适用性。在本文中,我们澄清和推广了Murphy和Player的结果。首先,我们将正态随机变量的离散化精确地近似为正态随机变量,正如Lyubashevsky, Peikert和Regev在加密过程中使用的那样。其次,我们展示了如何将Murphy和Player给出的分析扩展到k级密文,通过精确表征这些密文中的噪声分布。
{"title":"Discretisation and Product Distributions in Ring-LWE","authors":"S. Murphy, Rachel Player","doi":"10.1515/jmc-2020-0073","DOIUrl":"https://doi.org/10.1515/jmc-2020-0073","url":null,"abstract":"Abstract A statistical framework applicable to Ring-LWE was outlined by Murphy and Player (IACR eprint 2019/452). Its applicability was demonstrated with an analysis of the decryption failure probability for degree-1 and degree-2 ciphertexts in the homomorphic encryption scheme of Lyubashevsky, Peikert and Regev (IACR eprint 2013/293). In this paper, we clarify and extend results presented by Murphy and Player. Firstly, we make precise the approximation of the discretisation of a Normal random variable as a Normal random variable, as used in the encryption process of Lyubashevsky, Peikert and Regev. Secondly, we show how to extend the analysis given by Murphy and Player to degree-k ciphertexts, by precisely characterising the distribution of the noise in these ciphertexts.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"45 - 59"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0073","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48892415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1