DeepAI AI Chat
Log In Sign Up

Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange

11/21/2022
by   Sebastian Schlor, et al.
University of Stuttgart
0

The security of public-key cryptosystems relies on computationally hard problems, that are classically analyzed by number theoretic methods. In this paper, we introduce a new perspective on cryptosystems by interpreting the Diffie-Hellman key exchange as a nonlinear dynamical system. Employing Koopman theory, we transfer this dynamical system into a higher-dimensional space to analytically derive a purely linear system that equivalently describes the underlying cryptosystem. In this form, analytic tools for linear systems allow us to reconstruct the secret integers of the key exchange by simple manipulations. Moreover, we provide an upper bound on the minimal required lifting dimension to obtain perfect accuracy. To demonstrate the potential of our method, we relate our findings to existing results on algorithmic complexity. Finally, we transfer this approach to a data-driven setting where the Koopman representation is learned from data samples of the cryptosystem.

READ FULL TEXT

page 1

page 2

page 3

page 4

12/14/2021

Public key cryptography based on twisted dihedral group algebras

In this paper, we propose to use a twisted dihedral group algebra for pu...
04/30/2021

A Novel Provably Secure Key-Agreement Using Secret Subgroup Generator

: In this paper, a new key-agreement scheme is proposed and analyzed. In...
05/06/2022

Public key cryptography based on skew dihedral group rings

In this paper, we propose to use a skew dihedral group ring given by the...
09/20/2018

Towards practical key exchange from ordinary isogeny graphs

We revisit the ordinary isogeny-graph based cryptosystems of Couveignes ...
02/26/2018

O-Minimal Invariants for Linear Loops

The termination analysis of linear loops plays a key role in several are...
03/13/2023

The Realizations of Steganography in Encrypted Domain

With the popularization and application of privacy protection technologi...