|
Mathematical Methods of Cryptography
An improvement of cryptographic schemes based on the conjugacy search problem
V. A. Roman'kovab a Siberian Federal University, Krasnoyarsk
b Omsk State University
Abstract:
The key exchange protocol is a method of securely sharing cryptographic keys over a public channel. It is considered as important part of cryptographic mechanism to protect secure communications between two parties. The Diffie — Hellman protocol, based on the discrete logarithm problem, which is generally difficult to solve, is the most well-known key exchange protocol. One of the possible generalizations of the discrete logarithm problem to arbitrary noncommutative groups is the so-called conjugacy search problem: given two elements $g, h$ of a group $G$ and the information that $g^x = h$ for some $x \in G$, find at least one particular element $x$ like that. Here $g^x$ stands for $x^{-1}gx.$ This problem is in the core of several known public key exchange protocols, most notably the one due to Anshel et al. and the other due to Ko et al. In recent years, effective algebraic cryptanalysis methods have been developed that have shown the vulnerability of protocols of this type. The main purpose of this short note is to describe a new tool to improve protocols based on the conjugacy search problem. This tool has been introduced by the author in some recent papers. It is based on a new mathematical concept of a marginal set.
Keywords:
cryptography, key exchange protocol, conjugacy search problem, marginal set, algorithm.
Citation:
V. A. Roman'kov, “An improvement of cryptographic schemes based on the conjugacy search problem”, Prikl. Diskr. Mat. Suppl., 2021, no. 14, 114–118
Linking options:
https://www.mathnet.ru/eng/pdma544 https://www.mathnet.ru/eng/pdma/y2021/i14/p114
|
Statistics & downloads: |
Abstract page: | 131 | Full-text PDF : | 65 | References: | 22 |
|