首页 > 最新文献

Journal of Mathematical Cryptology最新文献

英文 中文
A trade-off between classical and quantum circuit size for an attack against CSIDH 针对CSIDH攻击的经典电路和量子电路尺寸之间的权衡
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/JMC-2020-0070
Jean-François Biasse, X. Bonnetain, Benjamin Pring, A. Schrottenloher, William Youmans
Abstract We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order 𝒪). Let Δ = Disc(𝒪) (in CSIDH, Δ = −4p for p the security parameter). Let 0 < α < 1/2, our algorithm requires: A classical circuit of size 2O˜log(|Δ|)1−α. $2^{tilde{O}left(log(|Delta|)^{1-alpha}right)}.$ A quantum circuit of size 2O˜log(|Δ|)α. $2^{tilde{O}left(log(|Delta|)^{alpha}right)}.$ Polynomial classical and quantum memory. Essentially, we propose to reduce the size of the quantum circuit below the state-of-the-art complexity 2O˜log(|Δ|)1/2 $2^{tilde{O}left(log(|Delta|)^{1/2}right)}$ at the cost of increasing the classical circuit-size required. The required classical circuit remains subexponential, which is a superpolynomial improvement over the classical state-of-the-art exponential solutions to these problems. Our method requires polynomial memory, both classical and quantum.
摘要提出了一种启发式算法来解决CSIDH密码系统(以及其他基于同胚密码系统的密码系统)的底层难题,这些密码系统使用具有自同构环的椭圆曲线与虚二次阶态同构)。设Δ =磁盘(变量)(在CSIDH中,对于安全参数p, Δ =−4p)。设0 < α < 1/2,我们的算法需要:一个大小为2O ~ log(|Δ|)1−α的经典电路。$2^{tilde{O}left(log(|Delta|)^{1-alpha}right)}.$尺寸为2O ~ log(|Δ|)α的量子电路。$2^{tilde{O}left(log(|Delta|)^{alpha}right)}.$多项式经典和量子存储器。从本质上讲,我们建议以增加所需的经典电路尺寸为代价,将量子电路的尺寸减小到最先进的复杂性2O ~ log(|Δ|)1/2 $2^{tilde{O}left(log(|Delta|)^{1/2}right)}$以下。所要求的经典电路仍然是次指数的,这是对这些问题的经典最先进的指数解的一个超多项式改进。我们的方法需要多项式存储器,包括经典和量子存储器。
{"title":"A trade-off between classical and quantum circuit size for an attack against CSIDH","authors":"Jean-François Biasse, X. Bonnetain, Benjamin Pring, A. Schrottenloher, William Youmans","doi":"10.1515/JMC-2020-0070","DOIUrl":"https://doi.org/10.1515/JMC-2020-0070","url":null,"abstract":"Abstract We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order 𝒪). Let Δ = Disc(𝒪) (in CSIDH, Δ = −4p for p the security parameter). Let 0 < α < 1/2, our algorithm requires: A classical circuit of size 2O˜log(|Δ|)1−α. $2^{tilde{O}left(log(|Delta|)^{1-alpha}right)}.$ A quantum circuit of size 2O˜log(|Δ|)α. $2^{tilde{O}left(log(|Delta|)^{alpha}right)}.$ Polynomial classical and quantum memory. Essentially, we propose to reduce the size of the quantum circuit below the state-of-the-art complexity 2O˜log(|Δ|)1/2 $2^{tilde{O}left(log(|Delta|)^{1/2}right)}$ at the cost of increasing the classical circuit-size required. The required classical circuit remains subexponential, which is a superpolynomial improvement over the classical state-of-the-art exponential solutions to these problems. Our method requires polynomial memory, both classical and quantum.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"4 - 17"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/JMC-2020-0070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48066193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Eleventh Power Residue Symbol 第十一幂余数符号
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0077
M. Joye, Oleksandra Lapiha, Ky Nguyen, D. Naccache
Abstract This paper presents an efficient algorithm for computing 11th-power residue symbols in the cyclo-tomic field ℚ(ζ11), $ mathbb{Q}left( {{zeta }_{11}} right), $where 11 is a primitive 11th root of unity. It extends an earlier algorithm due to Caranay and Scheidler (Int. J. Number Theory, 2010) for the 7th-power residue symbol. The new algorithm finds applications in the implementation of certain cryptographic schemes.
摘要本文给出了一种计算环分域(π (ζ11), $ mathbb{Q}left( {{zeta }_{11}} right), $,其中11是单位的原始11根)中11次剩馀符号的有效算法。它扩展了Caranay和Scheidler (Int)的早期算法。[j] .数论,2010)关于七次剩馀符号。新算法在某些加密方案的实现中得到了应用。
{"title":"The Eleventh Power Residue Symbol","authors":"M. Joye, Oleksandra Lapiha, Ky Nguyen, D. Naccache","doi":"10.1515/jmc-2020-0077","DOIUrl":"https://doi.org/10.1515/jmc-2020-0077","url":null,"abstract":"Abstract This paper presents an efficient algorithm for computing 11th-power residue symbols in the cyclo-tomic field ℚ(ζ11), $ mathbb{Q}left( {{zeta }_{11}} right), $where 11 is a primitive 11th root of unity. It extends an earlier algorithm due to Caranay and Scheidler (Int. J. Number Theory, 2010) for the 7th-power residue symbol. The new algorithm finds applications in the implementation of certain cryptographic schemes.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"111 - 122"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0077","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41654824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Isogeny-Based Password-Authenticated Key Establishment 基于等基因的密码认证密钥建立研究
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0071
Oleg Taraskin, Vladimir Soukharev, David Jao, Jason Legrow
Abstract Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure. We propose the first quantum-resistant password-authenticated key exchange scheme based on supersingular elliptic curve isogenies. The scheme is built upon supersingular isogeny Diffie-Hellman [15], and uses the password to generate permutations which obscure the auxiliary points. We include elements of a security proof, and discuss roadblocks to obtaining a proof in the BPR model [1]. We also include some performance results.
摘要密码认证密钥建立(PAKE)是一种密码学原语,它允许共享低熵秘密(密码)的双方在没有公钥基础设施的情况下安全地建立密钥。我们提出了第一个基于超奇异椭圆曲线同构的量子抗密码认证密钥交换方案。该方案建立在超奇异同胚Diffie-Hellman[15]的基础上,并使用密码生成模糊辅助点的排列。我们包括了安全证明的元素,并讨论了在BPR模型[1]中获得证明的障碍。我们还包括一些性能结果。
{"title":"Towards Isogeny-Based Password-Authenticated Key Establishment","authors":"Oleg Taraskin, Vladimir Soukharev, David Jao, Jason Legrow","doi":"10.1515/jmc-2020-0071","DOIUrl":"https://doi.org/10.1515/jmc-2020-0071","url":null,"abstract":"Abstract Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure. We propose the first quantum-resistant password-authenticated key exchange scheme based on supersingular elliptic curve isogenies. The scheme is built upon supersingular isogeny Diffie-Hellman [15], and uses the password to generate permutations which obscure the auxiliary points. We include elements of a security proof, and discuss roadblocks to obtaining a proof in the BPR model [1]. We also include some performance results.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"18 - 30"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48040540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
(In)Security of Ring-LWE Under Partial Key Exposure 部分密钥暴露下环形LWE的(In)安全性
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0075
D. Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi
Abstract We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under leakage of some fraction of coordinates of the NTT transform of the RLWE secret. (2) Present and implement an efficient key exposure attack that, given certain 1/4-fraction of the coordinates of the NTT transform of the RLWE secret, along with samples from the RLWE distribution, recovers the full RLWE secret for standard parameter settings. (3) Present a search-to-decision reduction for Leaky R-LWE for certain types of key exposure. (4) Propose applications to the security analysis of RLWE-based cryptosystems under partial key exposure.
摘要针对环lwe (Ring-LWE, RLWE)密码系统中的部分密钥暴露问题进行了研究。具体而言,我们(1)引入搜索和决策Leaky R-LWE假设(Leaky R-SLWE, Leaky R-DLWE),以形式化在RLWE秘密的NTT变换的部分坐标泄漏情况下搜索/决策RLWE的硬度。(2)提出并实施一种有效的密钥暴露攻击,给定RLWE秘密的NTT变换坐标的1/4分数,以及来自RLWE分布的样本,可以恢复标准参数设置的完整RLWE秘密。(3)对于某些类型的密钥暴露,给出了Leaky R-LWE的搜索决策缩减。(4)提出基于rlwe的密码系统在部分密钥暴露情况下的安全性分析应用。
{"title":"(In)Security of Ring-LWE Under Partial Key Exposure","authors":"D. Dachman-Soled, Huijing Gong, Mukul Kulkarni, Aria Shahverdi","doi":"10.1515/jmc-2020-0075","DOIUrl":"https://doi.org/10.1515/jmc-2020-0075","url":null,"abstract":"Abstract We initiate the study of partial key exposure in Ring-LWE (RLWE)-based cryptosystems. Specifically, we (1) Introduce the search and decision Leaky R-LWE assumptions (Leaky R-SLWE, Leaky R-DLWE), to formalize the hardness of search/decision RLWE under leakage of some fraction of coordinates of the NTT transform of the RLWE secret. (2) Present and implement an efficient key exposure attack that, given certain 1/4-fraction of the coordinates of the NTT transform of the RLWE secret, along with samples from the RLWE distribution, recovers the full RLWE secret for standard parameter settings. (3) Present a search-to-decision reduction for Leaky R-LWE for certain types of key exposure. (4) Propose applications to the security analysis of RLWE-based cryptosystems under partial key exposure.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"72 - 86"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0075","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48269224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips 一个比特就是它所需要的:对BLISS的非恒定时间符号翻转的毁灭性定时攻击
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-11-17 DOI: 10.1515/jmc-2020-0079
Mehdi Tibouchi, Alexandre Wallet
Abstract As one of the most efficient lattice-based signature schemes, and one of the only ones to have seen deployment beyond an academic setting (e.g., as part of the VPN software suite strongSwan), BLISS has attracted a significant amount of attention in terms of its implementation security, and side-channel vulnerabilities of several parts of its signing algorithm have been identified in previous works. In this paper, we present an even simpler timing attack against it. The bimodal Gaussian distribution that BLISS is named after is achieved using a random sign flip during signature generation, and neither the original implementation of BLISS nor strongSwan ensure that this sign flip is carried out in constant time. It is therefore possible to recover the corresponding sign through side-channel leakage (using, e.g., cache attacks or branch tracing). We show that obtaining this single bit of leakage (for a moderate number of signatures) is in fact sufficient for a full key recovery attack. The recovery is carried out using a maximum likelihood estimation on the space of parameters, which can be seen as a statistical manifold. The analysis of the attack thus reduces to the computation of the Fisher information metric.
作为最有效的基于格的签名方案之一,也是唯一一个在学术环境之外部署的方案(例如,作为VPN软件套件strongSwan的一部分),BLISS在其实现安全性方面引起了大量关注,并且在之前的工作中已经确定了其签名算法的几个部分的侧通道漏洞。在本文中,我们提出了一种更简单的定时攻击。BLISS命名的双峰高斯分布是在签名生成过程中使用随机符号翻转来实现的,BLISS的原始实现和strongSwan都不能确保这种符号翻转在恒定时间内进行。因此,有可能通过侧信道泄漏(使用,例如,缓存攻击或分支跟踪)恢复相应的符号。我们证明,获得这一点泄漏(对于中等数量的签名)实际上足以进行完整的密钥恢复攻击。利用参数空间的极大似然估计进行恢复,这可以看作是一个统计流形。因此,对攻击的分析简化为费雪信息度量的计算。
{"title":"One Bit is All It Takes: A Devastating Timing Attack on BLISS’s Non-Constant Time Sign Flips","authors":"Mehdi Tibouchi, Alexandre Wallet","doi":"10.1515/jmc-2020-0079","DOIUrl":"https://doi.org/10.1515/jmc-2020-0079","url":null,"abstract":"Abstract As one of the most efficient lattice-based signature schemes, and one of the only ones to have seen deployment beyond an academic setting (e.g., as part of the VPN software suite strongSwan), BLISS has attracted a significant amount of attention in terms of its implementation security, and side-channel vulnerabilities of several parts of its signing algorithm have been identified in previous works. In this paper, we present an even simpler timing attack against it. The bimodal Gaussian distribution that BLISS is named after is achieved using a random sign flip during signature generation, and neither the original implementation of BLISS nor strongSwan ensure that this sign flip is carried out in constant time. It is therefore possible to recover the corresponding sign through side-channel leakage (using, e.g., cache attacks or branch tracing). We show that obtaining this single bit of leakage (for a moderate number of signatures) is in fact sufficient for a full key recovery attack. The recovery is carried out using a maximum likelihood estimation on the space of parameters, which can be seen as a statistical manifold. The analysis of the attack thus reduces to the computation of the Fisher information metric.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"131 - 142"},"PeriodicalIF":1.2,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0079","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43516450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
MAKE: A matrix action key exchange MAKE:矩阵动作密钥交换
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-09-01 DOI: 10.1515/jmc-2020-0053
Nael Rahman, V. Shpilrain
Abstract We offer a public key exchange protocol based on a semidirect product of two cyclic (semi)groups of matrices over Z p {{mathbb{Z}}}_{p} . One of the (semi)groups is additive, and the other one is multiplicative. This allows us to take advantage of both operations on matrices to diffuse information. We note that in our protocol, no power of any matrix or of any element of Z p {{mathbb{Z}}}_{p} is ever exposed, so standard classical attacks on Diffie–Hellman-like protocols are not applicable.
摘要我们提供了一个基于Zp{mathbb{Z}}_{p}上两个循环(半)矩阵组的半直积的公钥交换协议。其中一个(半)群是加性的,另一个是乘性的。这使我们能够利用矩阵上的两种运算来扩散信息。我们注意到,在我们的协议中,任何矩阵或Z p{mathbb{Z}}}_{p}的任何元素的幂都不暴露,因此对Diffie–Hellman类协议的标准经典攻击不适用。
{"title":"MAKE: A matrix action key exchange","authors":"Nael Rahman, V. Shpilrain","doi":"10.1515/jmc-2020-0053","DOIUrl":"https://doi.org/10.1515/jmc-2020-0053","url":null,"abstract":"Abstract We offer a public key exchange protocol based on a semidirect product of two cyclic (semi)groups of matrices over Z p {{mathbb{Z}}}_{p} . One of the (semi)groups is additive, and the other one is multiplicative. This allows us to take advantage of both operations on matrices to diffuse information. We note that in our protocol, no power of any matrix or of any element of Z p {{mathbb{Z}}}_{p} is ever exposed, so standard classical attacks on Diffie–Hellman-like protocols are not applicable.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"64 - 72"},"PeriodicalIF":1.2,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49628878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The polynomial learning with errors problem and the smearing condition 带有误差的多项式学习问题和涂抹条件
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-08-11 DOI: 10.1515/jmc-2020-0035
L. Babinkostova, Ariana Chin, Aaron Kirtland, V. Nazarchuk, Esther Plotnick
Abstract As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and hardness guaranteed by reductions from hard computational lattice problems. Its algebraic variants, ring-learning with errors (RLWE) and polynomial learning with errors (PLWE), gain efficiency over standard LWE, but their security remains to be thoroughly investigated. In this work, we consider the “smearing” condition, a condition for attacks on PLWE and RLWE introduced in Elias et al. We expand upon some questions about smearing posed by Elias et al. and show how smearing is related to the coupon collector’s problem. Furthermore, we develop an algorithm for computing probabilities related to smearing. Finally, we present a smearing-based algorithm for solving the PLWE problem.
摘要随着量子计算的快速发展,保证密码协议的安全性以抵御量子攻击至关重要。一些领先的候选密码系统使用带误差学习(LWE)问题,该问题因其简单性和硬度而具有吸引力,该问题由硬计算格问题的约简保证。它的代数变体,带误差的环学习(RLWE)和带误差的多项式学习(PLWE),在标准LWE上获得了效率,但它们的安全性仍有待彻底研究。在这项工作中,我们考虑了“抹黑”条件,这是Elias等人引入的对PLWE和RLWE的攻击的条件。我们扩展了Elias等人提出的关于抹黑的一些问题。并展示了抹黑如何与优惠券收集器的问题相关。此外,我们还开发了一种算法来计算与涂抹相关的概率。最后,我们提出了一个基于涂抹的算法来解决PLWE问题。
{"title":"The polynomial learning with errors problem and the smearing condition","authors":"L. Babinkostova, Ariana Chin, Aaron Kirtland, V. Nazarchuk, Esther Plotnick","doi":"10.1515/jmc-2020-0035","DOIUrl":"https://doi.org/10.1515/jmc-2020-0035","url":null,"abstract":"Abstract As quantum computing advances rapidly, guaranteeing the security of cryptographic protocols resistant to quantum attacks is paramount. Some leading candidate cryptosystems use the learning with errors (LWE) problem, attractive for its simplicity and hardness guaranteed by reductions from hard computational lattice problems. Its algebraic variants, ring-learning with errors (RLWE) and polynomial learning with errors (PLWE), gain efficiency over standard LWE, but their security remains to be thoroughly investigated. In this work, we consider the “smearing” condition, a condition for attacks on PLWE and RLWE introduced in Elias et al. We expand upon some questions about smearing posed by Elias et al. and show how smearing is related to the coupon collector’s problem. Furthermore, we develop an algorithm for computing probabilities related to smearing. Finally, we present a smearing-based algorithm for solving the PLWE problem.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"215 - 232"},"PeriodicalIF":1.2,"publicationDate":"2020-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45068552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of group-theoretic cryptology attacks using hyper-heuristics 使用超启发式的群论密码学攻击的进化
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-06-15 DOI: 10.1515/jmc-2021-0017
M. J. Craven, J. Woodward
Abstract In previous work, we developed a single evolutionary algorithm (EA) to solve random instances of the Anshel–Anshel–Goldfeld (AAG) key exchange protocol over polycyclic groups. The EA consisted of six simple heuristics which manipulated strings. The present work extends this by exploring the use of hyper-heuristics in group-theoretic cryptology for the first time. Hyper-heuristics are a way to generate new algorithms from existing algorithm components (in this case, simple heuristics), with EAs being one example of the type of algorithm which can be generated by our hyper-heuristic framework. We take as a starting point the above EA and allow hyper-heuristics to build on it by making small tweaks to it. This adaptation is through a process of taking the EA and injecting chains of heuristics built from the simple heuristics. We demonstrate we can create novel heuristic chains, which when placed in the EA create algorithms that out perform the existing EA. The new algorithms solve a greater number of random AAG instances than the EA. This suggests the approach may be applied to many of the same kinds of problems, providing a framework for the solution of cryptology problems over groups. The contribution of this article is thus a framework to automatically build algorithms to attack cryptology problems given an applicable group.
摘要在之前的工作中,我们开发了一种单一进化算法(EA)来解决多环群上Anshel–Anshel-Goldfeld(AAG)密钥交换协议的随机实例。EA由六个简单的启发式方法组成,这些启发式方法处理字符串。本工作通过首次探索超启发式在群论密码学中的应用来扩展这一点。超启发式是从现有算法组件生成新算法的一种方式(在这种情况下,是简单启发式),EA是我们的超启发式框架可以生成的算法类型的一个例子。我们以上述EA为出发点,并允许超启发式通过对其进行小的调整来构建它。这种适应是通过采用EA并注入从简单启发式构建的启发式链的过程来实现的。我们展示了我们可以创建新的启发式链,当将其放置在EA中时,可以创建优于现有EA的算法。新算法比EA解决了更多的随机AAG实例。这表明该方法可以应用于许多相同类型的问题,为解决群上的密码学问题提供了一个框架。因此,本文的贡献是在给定一个适用的组的情况下,自动构建算法来攻击密码学问题。
{"title":"Evolution of group-theoretic cryptology attacks using hyper-heuristics","authors":"M. J. Craven, J. Woodward","doi":"10.1515/jmc-2021-0017","DOIUrl":"https://doi.org/10.1515/jmc-2021-0017","url":null,"abstract":"Abstract In previous work, we developed a single evolutionary algorithm (EA) to solve random instances of the Anshel–Anshel–Goldfeld (AAG) key exchange protocol over polycyclic groups. The EA consisted of six simple heuristics which manipulated strings. The present work extends this by exploring the use of hyper-heuristics in group-theoretic cryptology for the first time. Hyper-heuristics are a way to generate new algorithms from existing algorithm components (in this case, simple heuristics), with EAs being one example of the type of algorithm which can be generated by our hyper-heuristic framework. We take as a starting point the above EA and allow hyper-heuristics to build on it by making small tweaks to it. This adaptation is through a process of taking the EA and injecting chains of heuristics built from the simple heuristics. We demonstrate we can create novel heuristic chains, which when placed in the EA create algorithms that out perform the existing EA. The new algorithms solve a greater number of random AAG instances than the EA. This suggests the approach may be applied to many of the same kinds of problems, providing a framework for the solution of cryptology problems over groups. The contribution of this article is thus a framework to automatically build algorithms to attack cryptology problems given an applicable group.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"16 1","pages":"49 - 63"},"PeriodicalIF":1.2,"publicationDate":"2020-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42053351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Remarks on a Tropical Key Exchange System 关于热带密钥交换系统的几点看法
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-05-09 DOI: 10.1515/jmc-2019-0061
D. Rudy, C. Monico
Abstract We consider a key-exchange protocol based on matrices over a tropical semiring which was recently proposed in [2]. We show that a particular private parameter of that protocol can be recovered with a simple binary search, rendering it insecure.
摘要我们考虑了最近在[2]中提出的一种基于热带半环上矩阵的密钥交换协议。我们展示了该协议的特定私有参数可以通过简单的二进制搜索来恢复,从而使其不安全。
{"title":"Remarks on a Tropical Key Exchange System","authors":"D. Rudy, C. Monico","doi":"10.1515/jmc-2019-0061","DOIUrl":"https://doi.org/10.1515/jmc-2019-0061","url":null,"abstract":"Abstract We consider a key-exchange protocol based on matrices over a tropical semiring which was recently proposed in [2]. We show that a particular private parameter of that protocol can be recovered with a simple binary search, rendering it insecure.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"280 - 283"},"PeriodicalIF":1.2,"publicationDate":"2020-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2019-0061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44555950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial 关于第n个分圆多项式的Vandermonde矩阵的条件数
IF 1.2 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2020-02-19 DOI: 10.1515/jmc-2020-0009
A. J. Scala, C. Sanna, Edoardo Signorini
Abstract Recently, Blanco-Chacón proved the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for some families of cyclotomic number fields by giving some upper bounds for the condition number Cond(Vn) of the Vandermonde matrix Vn associated to the nth cyclotomic polynomial. We prove some results on the singular values of Vn and, in particular, we determine Cond(Vn) for n = 2kpℓ, where k, ℓ ≥ 0 are integers and p is an odd prime number.
摘要最近,Blanco Chacón通过给出与第n个分圆多项式相关的Vandermonde矩阵Vn的条件数Cond(Vn)的一些上界,证明了一些分圆数域族的带误差的环学习和带误差的多项式学习问题之间的等价性。我们证明了关于Vn奇异值的一些结果,特别是当n=2kp时,我们确定了Cond(Vn)ℓ, 其中k,ℓ ≥ 0是整数,p是奇数素数。
{"title":"On the condition number of the Vandermonde matrix of the nth cyclotomic polynomial","authors":"A. J. Scala, C. Sanna, Edoardo Signorini","doi":"10.1515/jmc-2020-0009","DOIUrl":"https://doi.org/10.1515/jmc-2020-0009","url":null,"abstract":"Abstract Recently, Blanco-Chacón proved the equivalence between the Ring Learning With Errors and Polynomial Learning With Errors problems for some families of cyclotomic number fields by giving some upper bounds for the condition number Cond(Vn) of the Vandermonde matrix Vn associated to the nth cyclotomic polynomial. We prove some results on the singular values of Vn and, in particular, we determine Cond(Vn) for n = 2kpℓ, where k, ℓ ≥ 0 are integers and p is an odd prime number.","PeriodicalId":43866,"journal":{"name":"Journal of Mathematical Cryptology","volume":"15 1","pages":"174 - 178"},"PeriodicalIF":1.2,"publicationDate":"2020-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/jmc-2020-0009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44445517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Journal of Mathematical Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1