Hard Problems for Non-abelian Group Cryptography

Authors

  • Yevgen Kotukh Sumy State University, Ukraine
  • Gennady Khalimov Kharkiv National University of Radio Electronics, Ukraine

DOI:

https://doi.org/10.30837/csitic52021232176

Keywords:

intractable problems, search problem, conjugacy problem, non-abelian groups, Shor algorithm

Abstract

The security of the DH key exchange protocol and many other public  key cryptosystems such as RSA,    ElGamal and ECC is based on the assumption that complex mathematical problems such as factorization (FP), discrete logarithm over finite fields (DLP), or elliptical curves (ECDLP) are intractable. The implementation of Shor and Grover's algorithms reduces the security of cryptosystems based on the intractability of these problems. 

References

N. R. Wagner, M. R. Magyarik, “A public key cryptosystem based on the word problem,” in Advances in Cryptology (CRYPTO’84), Lecture Notes in Computer Science, vol. 196, pp. 19-36, 1985

Tzu-Chun Lin. “A Study of Non-Abelian Public Key Cryptography” International Journal of Network Security, Vol.20, No.2, PP.278-290, Mar. 2018

Haibo Hong1⋆, Jun Shao1, Licheng Wang2, Haseeb Ahmad2 and Yixian Yang “Public Key Encryption in Non-Abelian Groups” https://arxiv.org/abs/1605.06608v1

G. Khalimov, Y. Kotukh, S.Khalimova “MST3 cryptosystem based on the automorphism group of the hermitian function field'' // IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019 - Proceedings, 2019, pр. 865–868.

G. Khalimov, Y. Kotukh, S.Khalimova “MST3 cryptosystem based on a generalized Suzuki 2 - Groups'' // CEUR Workshop Proceedings, 2020, 2711, pр. 1–15.

G. Khalimov, Y. Kotukh, S.Khalimova “Encryption scheme based on the automorphism group of the Ree function field'' 2020 7th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2020, 2020, 9340192

Published

2021-05-30

Issue

Section

RELIABILITY AND SAFETY ASSURANCE TECHNOLOGIES FOR COMPUTER AND INFORMATIONAL SYSTEMS