Koopman interpretation and analysis of a public-key cryptosystem: Diffie-Hellman key exchange

11/21/2022
by   Sebastian Schlor, et al.
0

The security of public-key cryptosystems relies on computationally hard problems, that are classically analyzed by number theoretic methods. In this paper, we introduce a new perspective on cryptosystems by interpreting the Diffie-Hellman key exchange as a nonlinear dynamical system. Employing Koopman theory, we transfer this dynamical system into a higher-dimensional space to analytically derive a purely linear system that equivalently describes the underlying cryptosystem. In this form, analytic tools for linear systems allow us to reconstruct the secret integers of the key exchange by simple manipulations. Moreover, we provide an upper bound on the minimal required lifting dimension to obtain perfect accuracy. To demonstrate the potential of our method, we relate our findings to existing results on algorithmic complexity. Finally, we transfer this approach to a data-driven setting where the Koopman representation is learned from data samples of the cryptosystem.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/14/2021

Public key cryptography based on twisted dihedral group algebras

In this paper, we propose to use a twisted dihedral group algebra for pu...
research
04/30/2021

A Novel Provably Secure Key-Agreement Using Secret Subgroup Generator

: In this paper, a new key-agreement scheme is proposed and analyzed. In...
research
05/06/2022

Public key cryptography based on skew dihedral group rings

In this paper, we propose to use a skew dihedral group ring given by the...
research
09/20/2018

Towards practical key exchange from ordinary isogeny graphs

We revisit the ordinary isogeny-graph based cryptosystems of Couveignes ...
research
02/26/2018

O-Minimal Invariants for Linear Loops

The termination analysis of linear loops plays a key role in several are...
research
07/19/2023

Reduction of the secret key length in the perfect cipher by data compression and randomisation

Perfect ciphers have been a very attractive cryptographic tool ever sinc...

Please sign up or login with your details

Forgot password? Click here to reset