Cryptographic Protocols using Semidirect Products of Finite Groups

被引:2
作者
Lanel, G. H. J. [1 ]
Jinasena, T. M. K. K. [2 ]
Welihinda, A. K. [1 ]
机构
[1] Univ Sri Jayewardenepura, Dept Math, Nugegoda, Sri Lanka
[2] Univ Sri Jayewardenepura, Dept Comp Sci, Nugegoda, Sri Lanka
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2021年 / 21卷 / 08期
关键词
Algebraic span cryptanalysis; Cayley graphs; Generalized Discrete Logarithm Problem; Hamiltonian Path/Cycle Problem; Non-abelian/Non-commutative; Semidirect products;
D O I
10.22937/IJCSNS.2021.21.8.3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to non-abelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.
引用
收藏
页码:17 / 27
页数:11
相关论文
共 26 条
  • [1] Anshel I, 2001, LECT NOTES COMPUT SC, V2020, P13
  • [2] Anshel I, 1999, MATH RES LETT, V6, P287
  • [3] Baba S., 2011, IACR CRYPTOLOGY EPRI, V2011, P48
  • [4] Cryptanalysis via Algebraic Spans
    Ben-Zvi, Adi
    Kalka, Arkadius
    Tsaban, Boaz
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 255 - 274
  • [5] Cheon JH, 2003, LECT NOTES COMPUT SC, V2729, P212
  • [6] Fine B., 2011, JP J ALGEBRA NUMBER
  • [7] THE COMPLEXITY OF GRIGORCHUK GROUPS WITH APPLICATION TO CRYPTOGRAPHY
    GARZON, M
    ZALCSTEIN, Y
    [J]. THEORETICAL COMPUTER SCIENCE, 1991, 88 (01) : 83 - 98
  • [8] New public key cryptosystems based on non-Abelian factorization problems
    Gu, Lize
    Wang, Licheng
    Ota, Kaoru
    Dong, Mianxiong
    Cao, Zhenfu
    Yang, Yixian
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 912 - 922
  • [9] Hong H, 2016, ARXIV160506608
  • [10] Ilic Ivana, 2010, Journal of Combinatorial Mathematics and Combinatorial Computing, V74, P3