Prikladnaya Diskretnaya Matematika
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Prikl. Diskr. Mat.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Prikladnaya Diskretnaya Matematika, 2017, Number 37, Pages 52–61
DOI: https://doi.org/10.17223/20710410/37/4
(Mi pdm594)
 

This article is cited in 4 scientific papers (total in 4 papers)

Mathematical Methods of Cryptography

General algebraic cryptographic key exchange scheme and its cryptanalysis

V. A. Roman'kov, A. A. Obzor

Dostoevskii Omsk State University, Omsk, Russia
Full-text PDF (708 kB) Citations (4)
References:
Abstract: We show that many known schemes of the cryptographic key public exchange protocols in algebraic cryptography using two-sided multiplications are the special cases of a general scheme of this type. In most cases, such schemes are built on the platforms that are subsets of some linear spaces. They have been repeatedly compromised by the linear decomposition method introduced by the first author. The method allows to compute the exchanged keys without computing any private data and, consequently, without solving the hard algorithmic problems on which the assumptions are based. Here, we show that this method can be successfully applied to the following general scheme and, thus, is a universal one. The general scheme proceeds as follows. Let $G$ be an algebraic system with the associative multiplication, for example, a group chosen as the platform. We assume that $G$ is a subset of a finitely dimensional linear space. First, some public elements $g_1,\dots,g_k\in G$ are taken. Then the correspondents, Alice and Bob, sequentially publicise the elements of the form $\varphi_{a,b}(f)$ for some $a,b\in G$, where $\varphi_{a,b}(f)=afb$, $f\in G$ and $f$ is a given or previously built element. The exchanged key has the form
\begin{equation*} K=\varphi_{a_l, b_l}(\varphi_{a_{l-1},b_{l-1}}(\dots(\varphi_{a_1,b_1}(g_i)\dots))=a_la_{l-1}\dots a_1g_ib_1\dots b_{l-1}b_l. \end{equation*}
We suppose that Alice chooses parameters $a,b$ in a given finitely generated subgroup $A$ of $G$, and Bob picks up parameters $a,b$ in a finitely generated subgroup $B$ of $G$ to construct their transformations of the form $\varphi_{a,b}$. Under some natural assumptions about $G,A$ and $B,$ we show that an intruder can efficiently calculate the exchanged key $K$ without calculation of the transformations used in the scheme.
Keywords: cryptography, cryptanalisis, key exchange, linear decomposition.
Funding agency Grant number
Russian Science Foundation 16-11-10002
Bibliographic databases:
Document Type: Article
UDC: 512.54+519.725
Language: Russian
Citation: V. A. Roman'kov, A. A. Obzor, “General algebraic cryptographic key exchange scheme and its cryptanalysis”, Prikl. Diskr. Mat., 2017, no. 37, 52–61
Citation in format AMSBIB
\Bibitem{RomObz17}
\by V.~A.~Roman'kov, A.~A.~Obzor
\paper General algebraic cryptographic key exchange scheme and its cryptanalysis
\jour Prikl. Diskr. Mat.
\yr 2017
\issue 37
\pages 52--61
\mathnet{http://mi.mathnet.ru/pdm594}
\crossref{https://doi.org/10.17223/20710410/37/4}
Linking options:
  • https://www.mathnet.ru/eng/pdm594
  • https://www.mathnet.ru/eng/pdm/y2017/i3/p52
  • This publication is cited in the following 4 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Прикладная дискретная математика
    Statistics & downloads:
    Abstract page:358
    Full-text PDF :104
    References:44
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024