PQC: Extended Triple Decomposition Problem (XTDP) Applied To GL(d, Fp)-An Evolved Framework For Canonical Non-Commutative Cryptography

11/20/2018
by   P. Hecht, et al.
0

Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols resistant to attacks using Shor polynomial time algorithm for numerical field problems or Grover search algorithm. A mostly overlooked but valuable line of solutions is provided by non-commutative algebraic structures, specifically canonical protocols that rely on one-way trapdoor functions (OWTF). Here we develop an evolved algebraic framework who could be applied to different asymmetric protocols. The (canonic) trapdoor one-way function here selected is a fortified version of the Triple decomposition Problem (TDP) developed by Kurt. The original protocol relies on two linear and one quadratic algebraic public equation. As quadratic equations are much more difficult to cryptanalyze, an Algebraic Span Attack (ASA) developed by Boaz Tsaban, focus on the linear ones. This seems to break our previous work. As a countermeasure, we present here an Extended TDP (cited as XTDP in this work). The main point is that the original public linear equations are transformed into quadratic ones and the same is accomplished for exchanged tokens between the entities. All details not presented here could be found at the cited references.

READ FULL TEXT
research
10/21/2018

PQC: Triple Decomposition Problem Applied To GL(d, Fp) - A Secure Framework For Canonical Non-Commutative Cryptography

Post-Quantum Cryptography (PQC) attempts to find cryptographic protocols...
research
02/19/2020

Algebraic Extension Ring Framework for Non-Commutative Asymmetric Cryptography

Post-Quantum Cryptography PQC attempts to find cryptographic protocols r...
research
07/22/2022

Cryptanalysis of a System based on Twisted Dihedral Group Algebras

Several cryptographic protocols constructed based on less-known algorith...
research
07/22/2022

Stochastic algebraic Riccati equations are almost as easy as deterministic ones

Stochastic algebraic Riccati equations, a.k.a. rational algebraic Riccat...
research
11/07/2018

Efficient semiquantum key distribution

Quantum cryptography has attracted much attention in recent years. In mo...
research
10/06/2018

Cryptanalysis of the DHDP and EGDP protocols over E_p^(m)

In this paper we break the protocol based on the Diffie-Hellman Decompos...
research
08/10/2022

Revisiting Algebraic Attacks on MinRank and on the Rank Decoding Problem

The Rank Decoding problem (RD) is at the core of rank-based cryptography...

Please sign up or login with your details

Forgot password? Click here to reset