Special Signature Schemes and Key Agreement Protocols

Total Page:16

File Type:pdf, Size:1020Kb

Special Signature Schemes and Key Agreement Protocols Special Signature Schemes and Key Agreement Protocols Caroline J. Kudla Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Group Department of Mathematics Royal Holloway, University of London 2006 Declaration These doctoral studies were conducted under the supervision of Kenneth G. Paterson. The work presented in this thesis is the result of original research carried out by myself, in collaboration with others, whilst enrolled in the Department of Mathematics as a candidate for the degree of Doctor of Philosophy. This work has not been submitted for any other degree or award in any other university or educational establishment. Caroline J. Kudla January, 2006 2 Acknowledgements My sincere thanks go to my supervisor, Kenny Paterson, whose dedication has been out- standing, and who has given generously of his time to guide and encourage me in my work over the last 3 years. His invaluable comments, constructive criticism and unwavering support have been crucial in helping me to achieve my goals and develop as a researcher. I would also like to thank my advisor, Chris Mitchell, for his encouragement in my various endeavors. I would like to express my deepest gratitude to HP Labs in Bristol, whose generous financial support has enabled me to pursue my studies. HP also permitted me to work from their labs, allowing me insight into the world of industrial research and providing me with invaluable experience. In particular, I would like to thank Keith Harrison for all his encouragement and advice during my time at HP, and Liqun Chen for her guidance and support. It has been great working with and learning from you both. I would also like to thank my friends and family, near and far, for all their encourage- ment over the last 3 years. I have finished studying - at last! Finally, I want to thank my beloved husband, Guillaume. He has been fantastic in every way, and I couldn’t have done this without his constant love and support. 3 Abstract This thesis is divided into two distinct parts. The first part of the thesis explores various deniable signature schemes and their applications. Such schemes do not bind a unique public key to a message, but rather specify a set of entities that could have created the signature, so each entity involved in the signature can deny having generated it. The main deniable signature schemes we examine are ring signature schemes. Ring signatures can be used to construct designated verifier signature schemes, which are closely related to designated verifier proof systems. We provide previously lacking formal definitions and security models for designated verifier proofs and signatures and examine their relationship to undeniable signature schemes. Ring signature schemes also have applications in the context of fair exchange of signa- tures. We introduce the notion of concurrent signatures, which can be constructed using ring signatures, and which provide a “near solution” to the problem of fair exchange. Concurrent signatures are more efficient than traditional solutions for fair exchange at the cost of some of the security guaranteed by traditional solutions. The second part of the thesis is concerned with the security of two-party key agreement protocols. It has traditionally been difficult to prove that a key agreement protocol satisfies a formal definition of security. A modular approach to constructing provably secure key agreement protocols was proposed, but the approach generally results in less efficient protocols. We examine the relationships between various well-known models of security and in- troduce a modular approach to the construction of proofs of security for key agreement protocols in such security models. Our approach simplifies the proof process, enabling us to provide proofs of security for several efficient key agreement protocols in the literature that were previously unproven. 4 Contents 1 Introduction 9 1.1 Contributions . 9 1.2 Overall Structure . 11 1.3 Publications . 12 I Special Signature Schemes 13 2 Preliminary Topics 14 2.1 Mathematical Background . 14 2.1.1 Complexity Theory . 14 2.1.2 Abstract Algebra . 15 2.1.3 The Discrete Logarithm and Diffie-Hellman Problems . 16 2.1.4 Additional Notation . 18 2.2 Public Key Cryptography . 18 2.2.1 Basic Terminology and Cryptographic Goals . 18 2.2.2 Key Infrastructures . 19 2.2.3 Digital Signature Schemes . 20 2.3 Provable Security . 21 2.3.1 Security Definition for Digital Signatures . 24 2.3.2 Cryptographic Hash Functions . 25 2.3.3 The Random Oracle Model . 26 2.3.4 Rewinding Oracles and the Forking Lemma . 27 2.3.5 The Non-Generic Forking Lemma . 29 3 Ring Signature Schemes 32 3.1 Introduction . 32 3.2 Preliminaries . 32 3.3 Ring Signature Definitions . 33 3.3.1 Related Work . 33 3.4 Security Model . 34 5 CONTENTS 3.4.1 Correctness . 34 3.4.2 Anonymity . 34 3.4.3 Unforgeability . 35 3.4.4 Notes on the Security Definitions for Ring Signatures . 35 3.5 A Concrete Scheme . 36 3.6 Security of the Concrete Scheme . 37 4 Non-interactive Designated Verifier Proofs and Their Applications 40 4.1 Introduction . 40 4.1.1 Related Work and Notions . 43 4.2 NIDV Proofs . 44 4.3 Security for NIDV Proofs . 45 4.3.1 Correctness . 45 4.3.2 Non-transferability . 45 4.3.3 Soundness . 45 4.3.4 Notes on the Security Definitions for NIDV Proof Systems . 46 4.4 NIDV Undeniable Signatures . 48 4.5 Security for NIDV Undeniable Signatures . 49 4.5.1 The Security of the Core Signature Scheme . 49 4.5.2 Notes on the Security Definitions for Undeniable Signatures . 51 4.6 A Concrete NIDV Undeniable Signature Scheme . 53 4.6.1 The Core Signature . 53 4.6.2 The Confirmation and Denial Proofs . 54 4.6.3 A Concrete NIDV EDL Proof System . 54 4.6.4 A Concrete NIDV IDL Proof System . 55 4.7 Security of the Concrete Scheme . 56 4.7.1 Security of the NIDV EDL proof system . 56 4.7.2 Security of the NIDV IDL proof system . 64 4.7.3 Application to the core signature scheme . 71 4.8 DV Signatures . 77 4.9 Security for DV Signatures . 78 4.9.1 Correctness . 78 4.9.2 Non-transferability . 78 4.9.3 Unforgeability . 79 4.9.4 Notes on the Security Definitions for DV Signatures . 80 4.9.5 Comparison to Other Work . 80 4.10 Concrete DV Signature Schemes . 81 4.10.1 DV Signatures from Ring Signatures . 81 4.10.2 DV Signatures from NIDV Undeniable Signatures . 83 4.10.3 A Concrete DV Signature Scheme from an NIDV EDL Proof . 83 6 CONTENTS 4.10.4 Security of our Concrete DV Signature Scheme . 84 4.11 Conclusions and Open Problems . 89 5 Concurrent Signatures 91 5.1 Introduction . 91 5.1.1 Technical Approach . 95 5.1.2 Published Work . 96 5.2 Formal Definitions . 97 5.2.1 Concurrent Signature Algorithms . 97 5.2.2 Concurrent Signature Protocol . 98 5.3 Formal Security Model . 99 5.3.1 Correctness . 99 5.3.2 Non-transferability . 99 5.3.3 Unforgeability . 100 5.3.4 Fairness . 101 5.4 A Concrete Concurrent Signature Scheme . 102 5.5 Security of the Concrete Concurrent Signature Scheme . 103 5.6 Extensions and Open Problems . 111 5.6.1 The Scheme Can Use a Variety of Keys . 111 5.6.2 The Multi-party Case . 111 5.6.3 Extensions to Concurrent Signatures . 112 5.7 Conclusion . 113 II Key Agreement Protocols 114 6 Introduction to Key Agreement 115 6.1 Basic Concepts . 115 6.1.1 Adversarial Assumptions . 116 6.2 The Diffie-Hellman Protocol . 116 6.2.1 Man-in-the-Middle Attacks . 117 6.3 Authenticated Key Agreement . 118 6.3.1 Security Attributes . 120 6.3.2 Authenticated Diffie-Hellman Protocols . 121 6.3.3 Security Attributes of Protocols 2 and 3 . 122 7 Models of Security for Key Agreement Protocols 125 7.1 Introduction . 125 7.2 The BJM Model . 126 7.2.1 Protocol Participants . 127 7.2.2 Oracle Queries . 128 7 CONTENTS 7.2.3 Matching Conversations . 129 7.2.4 Freshness . 130 7.2.5 The BJM Game and Test Query . 130 7.2.6 AK security . 131 7.2.7.
Recommended publications
  • A Study of Non-Abelian Public Key Cryptography
    International Journal of Network Security, Vol.20, No.2, PP.278-290, Mar. 2018 (DOI: 10.6633/IJNS.201803.20(2).09) 278 A Study of Non-Abelian Public Key Cryptography Tzu-Chun Lin Department of Applied Mathematics, Feng Chia University 100, Wenhwa Road, Taichung 40724, Taiwan, R.O.C. (Email: [email protected]) (Received Feb. 12, 2017; revised and accepted June 12, 2017) Abstract P.W. Shor pointed out that there are polynomial-time algorithms for solving the factorization and discrete log- Nonabelian group-based public key cryptography is a rel- arithmic problems based on abelian groups during the atively new and exciting research field. Rapidly increas- functions of a quantum computer. Research in new cryp- ing computing power and the futurity quantum comput- tographic methods is also imperative, as research on non- ers [52] that have since led to, the security of public key abelian group-based cryptosystems will be one of new re- cryptosystems in use today, will be questioned. Research search priorities. In fact, the pioneering work for non- in new cryptographic methods is also imperative. Re- abelian group-based public key cryptosystem was pro- search on nonabelian group-based cryptosystems will be- posed by N. R. Wagner and M. R. Magyarik [61] in 1985. come one of contemporary research priorities. Many inno- Their idea just is not suitable for practical applications. vative ideas for them have been presented for the past two For nearly two decades, numerous nonabelian groups have decades, and many corresponding problems remain to be been discussed to design efficient cryptographic systems.
    [Show full text]
  • The Algebraic Eraser: a Linear Asymmetric Protocol for Low-Resource Environments
    The Algebraic Eraser: a linear asymmetric protocol for low-resource environments Derek Atkins, Paul E. Gunnells SecureRF Corporation IETF92 (3/25/15) Algebraic Eraser I I. Anshel, M. Anshel, D. Goldfeld, and S. Lemieux, Key agreement, the Algebraic EraserTM, and lightweight cryptography, Algebraic methods in cryptography, Contemp. Math., vol. 418, Amer. Math. Soc., Providence, RI, 2006, pp. 1{34. I Asymmetric key agreement protocol I Designed for low-cost platforms with constrained computational resources I RFID I Bluetooth I NFC I \Internet of Things" I Complexity scales linearly with desired security level, unlike RSA, ECC. AE Performance vs ECC 2128 Security level (AES{128) ECC 283 AE B16, F256 Gain Cycles Gates Wtd. Perf. Cycles Gates Wtd. Perf. 164,823 29,458 4,855,355,934 71.7x 85,367 77,858 6,646,503,866 3,352 20,206 67,730,512 98.1x 70,469 195,382 13,768,374,158 203.3x Wtd. Perf. is Weighted Performance (clock cycles × gate count) and represents time and power usage. Gate counts are for 65nm CMOS. ECC data taken from A Flexible Soft IP Core for Standard Implementations of Elliptic Curve Cryptography in Hardware, B. Ferreira and N. Calazans, 2013 IEEE 20th International Conference on Electronics, Circuits, and Systems (ICECS), 12/2013. Overview of AE I The AE key exchange is a nonabelian Diffie–Hellman exchange. × I The underlying algebraic structure is not (Z=NZ) or E(Fq), but rather I Mn(Fq)(n × n matrices over Fq), I Bn (the braid group on n strands). I Private keys: a pair R = (m; µ) of a matrix and braid.
    [Show full text]
  • A Practical Cryptanalysis of the Algebraic Eraser
    A Practical Cryptanalysis of the Algebraic Eraser B Adi Ben-Zvi1, Simon R. Blackburn2( ), and Boaz Tsaban1 1 Department of Mathematics, Bar-Ilan University, Ramat Gan 5290002, Israel 2 Department of Mathematics, Royal Holloway University of London, Egham TW20 0EX, Surrey, UK [email protected] Abstract. We present a novel cryptanalysis of the Algebraic Eraser prim- itive. This key agreement scheme, based on techniques from permutation groups, matrix groups and braid groups, is proposed as an underlying technology for ISO/IEC 29167-20, which is intended for authentication of RFID tags. SecureRF, the company owning the trademark Algebraic Eraser, markets it as suitable in general for lightweight environments such as RFID tags and other IoT applications. Our attack is practical on stan- dard hardware: for parameter sizes corresponding to claimed 128-bit secu- rity, our implementation recovers the shared key using less than 8 CPU hours, and less than 64 MB of memory. 1 Introduction The Algebraic EraserTM is a key agreement scheme using techniques from non- commutative group theory. It was announced by Anshel, Anshel, Goldfeld and Lemieaux in 2004; the corresponding paper [1] appeared in 2006. The Algebraic Eraser is defined in a very general fashion: various algebraic structures (monoids, groups and actions) need to be specified in order to be suitable for implementation. Anshel et al. provide most of this extra information, and name this concrete realisa- tion of the Algebraic Eraser the Colored Burau Key Agreement Protocol (CBKAP). This concrete representation involves a novel blend of finite matrix groups and per- mutation groups with infinite braid groups.
    [Show full text]
  • A Practical Cryptanalysis of the Algebraic Eraser
    A Practical Cryptanalysis of the Algebraic Eraser Adi Ben-Zvi∗ Simon R. Blackburn† Boaz Tsaban∗ June 3, 2016 Abstract We present a novel cryptanalysis of the Algebraic Eraser primitive. This key agreement scheme, based on techniques from permutation groups, matrix groups and braid groups, is proposed as an underlying technology for ISO/IEC 29167-20, which is intended for authentica- tion of RFID tags. SecureRF, the company owning the trademark Algebraic Eraser, markets it as suitable in general for lightweight en- vironments such as RFID tags and other IoT applications. Our attack is practical on standard hardware: for parameter sizes corresponding to claimed 128-bit security, our implementation recovers the shared key using less than 8 CPU hours, and less than 64MB of memory. 1 Introduction arXiv:1511.03870v2 [math.GR] 2 Jun 2016 The Algebraic Eraser™ is a key agreement scheme using techniques from non-commutative group theory. It was announced by Anshel, Anshel, Gold- feld and Lemieaux in 2004; the corresponding paper [1] appeared in 2006. ∗Department of Mathematics, Bar-Ilan University, Ramat Gan 5290002, Israel †Department of Mathematics, Royal Holloway University of London, Egham, Surrey TW20 0EX, United Kingdom © IACR 2016. This article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 1 June 2016. The version published by Springer-Verlag is available at [DOI to follow]. 1 The Algebraic Eraser is defined in a very general fashion: various algebraic structures (monoids, groups and actions) need to be specified in order to be suitable for implementation. Anshel et al.
    [Show full text]
  • On the Security of the Algebraic Eraser Tag Authentication Protocol
    On the Security of the Algebraic Eraser Tag Authentication Protocol Simon R. Blackburn Information Security Group Royal Holloway University of London Egham, TW20 0EX, United Kingdom and M.J.B. Robshaw Impinj 400 Fairview Ave. N., Suite 1200 Seattle, WA 98109, USA October 31, 2018 Abstract The Algebraic Eraser has been gaining prominence as SecureRF, the company commercializing the algorithm, increases its marketing reach. The scheme is claimed to be well-suited to IoT applications but a lack of detail in available documentation has hampered peer- review. Recently more details of the system have emerged after a tag arXiv:1602.00860v2 [cs.CR] 2 Jun 2016 authentication protocol built using the Algebraic Eraser was proposed for standardization in ISO/IEC SC31 and SecureRF provided an open public description of the protocol. In this paper we describe a range of attacks on this protocol that include very efficient and practical tag impersonation as well as partial, and total, tag secret key recovery. Most of these results have been practically verified, they contrast with the 80-bit security that is claimed for the protocol, and they emphasize the importance of independent public review for any cryptographic proposal. Keywords: Algebraic Eraser, cryptanalysis, tag authentication, IoT. 1 1 Introduction Extending security features to RAIN RFID tags1 and other severely con- strained devices in the Internet of Things is not easy. However the different pieces of the deployment puzzle are falling into place. Over-the-air (OTA) commands supporting security features have now been standardized [11] and both tag and reader manufacturers can build to these specifications knowing that interoperability will follow.
    [Show full text]
  • Algebraic Eraser™ and Lightweight Cryptography
    Walnut Digital Signature AlgorithmTM: A lightweight, quantum-resistant signature scheme for use in passive, low-power, and IoT devices Derek Atkins, SecureRF Corporation Historically “Lightweight Cryptography” has focused on symmetric schemes, yet asymmetric methods can also work effectively in these environments. Specifically, the Walnut Digital Signature AlgorithmTM (WalnutDSATM) provides a public-key signature scheme that verifies signatures significantly faster than ECC in both software and hardware, even in small, constrained environments and is resistant to all known attacks, both conventional and quantum. Specifically, WalnutDSA can validate a signature anywhere from 32 to 178 times faster than ECC using less ROM/RAM or fewer gates. This presentation previews the Walnut Digital Signature Algorithm, performance results, and shows how it can be applied to real-world uses. SecureRF Corporation 100 Beard Sawmill Road Suite 350 Shelton, CT 06484 203-227-3151 [email protected] www.SecureRF.com Walnut Digital Signature AlgorithmTM: A lightweight, quantum-resistant signature scheme for use in passive, low-power, and IoT devices 1. Introduction As Moore's Law continues, smaller and smaller devices are gaining more and more computational power. Where in the previous decades end systems were home personal computers, laptops, and even cloud servers, these days systems are getting smaller and more constrained. Growing into the Internet of Things, no longer are systems as powerful as before, as companies spend pennies to add computational resources to devices as small as light bulbs. However as these devices get smaller, the need to secure them grows exponentially. As more devices get connected the need to identify, authenticate, and protect those devices grows.
    [Show full text]
  • A Practical Cryptanalysis of the Algebraic Eraser
    A Practical Cryptanalysis of the Algebraic Eraser Adi Ben-Zvi1, Simon R. Blackburn2, and Boaz Tsaban1 1 Department of Mathematics, Bar-Ilan University, Ramat Gan 5290002, Israel 2 Department of Mathematics, Royal Holloway University of London, Egham, Surrey TW20 0EX, United Kingdom Abstract. We present a novel cryptanalysis of the Algebraic Eraser primitive. This key agreement scheme, based on techniques from per- mutation groups, matrix groups and braid groups, is proposed as an underlying technology for ISO/IEC 29167-20, which is intended for au- thentication of RFID tags. SecureRF, the company owning the trade- mark Algebraic Eraser, markets it as suitable in general for lightweight environments such as RFID tags and other IoT applications. Our attack is practical on standard hardware: for parameter sizes corresponding to claimed 128-bit security, our implementation recovers the shared key us- ing less than 8 CPU hours, and less than 64MB of memory. 1 Introduction The Algebraic EraserTM is a key agreement scheme using techniques from non- commutative group theory. It was announced by Anshel, Anshel, Goldfeld and Lemieaux in 2004; the corresponding paper [1] appeared in 2006. The Alge- braic Eraser is defined in a very general fashion: various algebraic structures (monoids, groups and actions) need to be specified in order to be suitable for implementation. Anshel et al. provide most of this extra information, and name this concrete realisation of the Algebraic Eraser the Colored Burau Key Agree- ment Protocol (CBKAP). This concrete representation involves a novel blend of finite matrix groups and permutation groups with infinite braid groups. A com- pany, SecureRF, owns the trademark to the Algebraic Eraser, and is marketing this primitive as suitable for low resource environments such as RFID tags and Internet of Things (IoT) applications.
    [Show full text]
  • A Practical Cryptanalysis of the Algebraic Eraser
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Royal Holloway - Pure A Practical Cryptanalysis of the Algebraic Eraser Adi Ben-Zvi∗ Simon R. Blackburn† Boaz Tsaban∗ June 1, 2016 Abstract We present a novel cryptanalysis of the Algebraic Eraser primitive. This key agreement scheme, based on techniques from permutation groups, matrix groups and braid groups, is proposed as an underlying technology for ISO/IEC 29167-20, which is intended for authentica- tion of RFID tags. SecureRF, the company owning the trademark Algebraic Eraser, markets it as suitable in general for lightweight en- vironments such as RFID tags and other IoT applications. Our attack is practical on standard hardware: for parameter sizes corresponding to claimed 128-bit security, our implementation recovers the shared key using less than 8 CPU hours, and less than 64MB of memory. 1 Introduction The Algebraic Eraser™ is a key agreement scheme using techniques from non-commutative group theory. It was announced by Anshel, Anshel, Gold- feld and Lemieaux in 2004; the corresponding paper [1] appeared in 2006. ∗Department of Mathematics, Bar-Ilan University, Ramat Gan 5290002, Israel †Department of Mathematics, Royal Holloway University of London, Egham, Surrey TW20 0EX, United Kingdom © IACR 2016. This article is the final version submitted by the author(s) to the IACR and to Springer-Verlag on 1 June 2016. The version published by Springer-Verlag is available at [DOI to follow]. 1 The Algebraic Eraser is defined in a very general fashion: various algebraic structures (monoids, groups and actions) need to be specified in order to be suitable for implementation.
    [Show full text]
  • PGP 7.0 Mac Users Guide
    PGP Freeware for MacOS User’s Guide Version 7.0 Copyright©1990-2001NetworkAssociates,Inc.anditsAffiliatedCompanies.AllRights Reserved. PGP*,Version7.0.3 01-2001.PrintedintheUnitedStatesofAmerica. PGP,PrettyGood,andPrettyGoodPrivacyareregisteredtrademarksofNetworkAssociates, Inc.and/oritsAffiliatedCompaniesintheUSandothercountries.Allotherregisteredand unregisteredtrademarksinthisdocumentarethesolepropertyoftheirrespectiveowners. PortionsofthissoftwaremayusepublickeyalgorithmsdescribedinU.S.Patentnumbers 4,200,770,4,218,582,4,405,829,and4,424,414,licensedexclusivelybyPublicKeyPartners;the IDEA(tm)cryptographiccipherdescribedinU.S.patentnumber5,214,703,licensedfrom AscomTechAG;andtheNorthernTelecomLtd.,CASTEncryptionAlgorithm,licensedfrom NorthernTelecom,Ltd.IDEAisatrademarkofAscomTechAG.NetworkAssociatesInc.may havepatentsand/orpendingpatentapplicationscoveringsubjectmatterinthissoftwareor itsdocumentation;thefurnishingofthissoftwareordocumentationdoesnotgiveyouany licensetothesepatents.ThecompressioncodeinPGPisbyMarkAdlerandJean-LoupGailly, usedwithpermissionfromthefreeInfo-ZIPimplementation.LDAPsoftwareprovided courtesyUniversityofMichiganatAnnArbor,Copyright©1992-1996Regentsofthe UniversityofMichigan.Allrightsreserved.Thisproductincludessoftwaredevelopedbythe ApacheGroupforuseintheApacheHTTPserverproject(http://www.apache.org/).Balloon helpsupportcourtesyofJamesW.Walker.Copyright©1995-1999TheApacheGroup.All rightsreserved.SeetextfilesincludedwiththesoftwareorthePGPwebsiteforfurther information.ThissoftwareisbasedinpartontheworkoftheIndependentJPEGGroup.Soft
    [Show full text]
  • Group Theoretic Cryptography and the Algebraic Eraser™
    Group Theoretic Cryptography and the Algebraic Eraser™ Simon R. Blackburn Royal Holloway University of London 9th March 2016 Simon R. Blackburn (RHUL) The Algebraic Eraser 1 / 16 Overview 1 The Discrete Log Problem and Diffie-Hellman 2 Group-theoretic analogues of DLP 3 The Algebraic Eraser 4 Attacks Simon R. Blackburn (RHUL) The Algebraic Eraser 2 / 16 Discrete logarithm problem (DLP) ∗ Let p be a prime and let g; h 2 Zp. Find an integer x (if it exists) such that h ≡ g x mod p. In general, this is a hard computational problem (for large p). Example: Let p = 11, g = 2 and h = 9. Solve the DLP. x 0 1 2 3 4 5 6 7 8 9 g x 1 2 4 8 5 10 9 7 3 6 Simon R. Blackburn (RHUL) The Algebraic Eraser 3 / 16 Diffie-Hellman key exchange Alice and Bob want to agree on a random key K. ∗ They decide upon a large prime p and some g 2 Zp, then: a Alice chooses a random integer 1 ≤ a < p − 1 and sends c1 = g mod p to Bob. b Bob chooses a random integer 1 ≤ b < p − 1 and sends c2 = g mod p to Alice. a On receiving c2 Alice computes K = c2 mod p. b On receiving c1 Bob computes K = c1 mod p. Alice and Bob both share the same key K = g ab mod p. It works because( g a)b = (g b)a. Simon R. Blackburn (RHUL) The Algebraic Eraser 4 / 16 What does security mean? a b An adversary Eve knows p and g, and sees c1 = g and c2 = g .
    [Show full text]
  • Mathematical Introduction to Coding Theory and Cryptography Yi Ouyang
    Mathematical Introduction to Coding Theory and Cryptography Yi Ouyang School of Mathematical Sciences, University of Science and Technology of China Email address: [email protected] Contents Chapter 1. Preliminaries 1 1. Theory of Integers 1 2. Polynomials over a field 4 3. Finite fields 6 Notations 9 Part 1. Coding Theory 11 Chapter 2. Introduction to Coding Theory 13 1. Background 13 2. Basic Definitions 15 Chapter 3. Linear Codes 19 1. Basic definitions 19 2. Hamming codes 23 3. Equivalence of codes 23 4. Encoding and decoding Algorithms 24 Chapter 4. Bounds of codes and codes with good bounds 29 1. Bounds of codes 29 2. Golay Codes 33 3. Other examples of optimal codes 36 Chapter 5. Constructing Codes from Other Codes 39 1. General Rules for Construction 39 2. Reed Muller Codes 41 Chapter 6. Weight Enumerators and the MacWilliams Theorem 47 1. MacWilliams Identity 47 Chapter 7. Sequences over finite fields 53 1. Sequences and Power Series over Finite Fields 53 2. Linear Feedback Shift Registers(LFSR) 57 3. Berlekamp-Massey Algorithm 60 Chapter 8. Cyclic codes and BCH codes 63 1. Cyclic codes 63 2. Trace Expression of Cyclic codes 67 iii iv CONTENTS 3. The BCH codes 69 4. Goppa Code 75 Chapter 9. Generalized GRS codes 79 1. Generalized GRS codes 79 2. Decoding GRS codes 80 Part 2. Cryptography 83 Chapter 10. History and Basic knowledge about Cryptography 85 1. Cryptography from early age 85 Chapter 11. Hard Computational Problems 91 1. Trapdoor function and One-way function 91 2. Factoring and RSA 92 Chapter 12.
    [Show full text]
  • The Algebraic Eraser™
    The Algebraic Eraser™ Simon R. Blackburn Royal Holloway University of London 5th January 2016 Simon R. Blackburn (RHUL) The Algebraic Eraser 1 / 16 Overview 1 The Discrete Log Problem and Diffie-Hellman 2 Group-theoretic analogues of DLP 3 The Algebraic Eraser 4 More ideas Simon R. Blackburn (RHUL) The Algebraic Eraser 2 / 16 Discrete logarithm problem (DLP) ∗ Let p be a prime and let g; h 2 Zp. Find an integer x (if it exists) such that h ≡ g x mod p. In general, this is a hard computational problem (for large p). Example: Let p = 11, g = 2 and h = 9. Solve the DLP. x 0 1 2 3 4 5 6 7 8 9 g x 1 2 4 8 5 10 9 7 3 6 Simon R. Blackburn (RHUL) The Algebraic Eraser 3 / 16 Diffie-Hellman key exchange Alice and Bob want to agree on a random key K. ∗ They decide upon a large prime p and some g 2 Zp, then: a Alice chooses a random integer 1 ≤ a < p − 1 and sends c1 = g mod p to Bob. b Bob chooses a random integer 1 ≤ b < p − 1 and sends c2 = g mod p to Alice. a On receiving c2 Alice computes K = c2 mod p. b On receiving c1 Bob computes K = c1 mod p. Alice and Bob both share the same key K = g ab mod p. It works because( g a)b = (g b)a. Simon R. Blackburn (RHUL) The Algebraic Eraser 4 / 16 What does security mean? a b An adversary Eve knows p and g, and sees c1 = g and c2 = g .
    [Show full text]