On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms
dc.contributor.author | Ustimenko, Vasyl | |
dc.date.accessioned | 2020-10-15T14:47:36Z | |
dc.date.available | 2020-10-15T14:47:36Z | |
dc.date.issued | 2020 | |
dc.description.abstracten | We suggest new applications of protocols of Non-commutative cryptography defined in terms of subsemigroups of Affine Cremona Semigroups over finite commutative rings and their homomorphic images to the constructions of possible instruments of Post Quantum Cryptography. This approach allows to define cryptosystems which are not public keys. When extended protocol is finished correspondents have the collision multivariate transformation on affine space Kn or variety (K*)n where K is a finite commutative ring and K* is nontrivial multiplicative subgroup of K. The security of such protocol rests on the complexity of word problem to decompose element of Affine Cremona Semigroup given in its standard form into composition of given generators. The collision map can serve for the safe delivery of several bijective multivariate maps Fi (generators) on Kn from one correspondent to another. So asymmetric cryptosystem with nonpublic multivariate generators where one side (Alice) knows inverses of Fi but other does not have such a knowledge is possible. We consider the usage of single protocol or combinations of two protocols with platforms of different nature. The usage of two protocols with the collision spaces Kn and (K*)n allows safe delivery of two sets of generators of different nature. In terms of such sets we define an asymmetric encryption scheme with the plainspace (K*)n, cipherspace Kn and multivariate non-bijective encryption map of unbounded degree O(n) and polynomial density on Kn with injective restriction on (K*)n. Algebraic cryptanalysis faces the problem to interpolate a natural decryption transformation which is not a map of polynomial density. | uk |
dc.format.pagerange | Pp. 32-44 | uk |
dc.identifier.citation | Ustimenko, V. On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms / Vasyl Ustimenko // Theoretical and Applied Cybersecurity : scientific journal. – 2020. – Vol. 2, Iss. 1. – Pp. 32–44. – Bibliogr.: 48 ref. | uk |
dc.identifier.doi | https://doi.org/10.20535/tacs.2664-29132020.1.209435 | |
dc.identifier.uri | https://ela.kpi.ua/handle/123456789/36791 | |
dc.language.iso | en | uk |
dc.publisher | Igor Sikorsky Kyiv Polytechnic Institute | uk |
dc.publisher.place | Kyiv | uk |
dc.source | Theoretical and Applied Cybersecurity : scientific journal, 2020, Vol. 2, No. 1 | uk |
dc.subject | Multivariate Cryptography | uk |
dc.subject | Noncommutative Cryptography | uk |
dc.subject | stable trans-formation groups and semigroups | uk |
dc.subject | semigroups of monomial transformations | uk |
dc.subject | word problem for nonlinear multivariate maps | uk |
dc.subject | hidden tame homomorphisms | uk |
dc.subject | key exchange protocols | uk |
dc.subject | cryptosystems | uk |
dc.subject | linguistic graph | uk |
dc.subject.udc | 001.8 | uk |
dc.title | On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms | uk |
dc.type | Article | uk |
Файли
Контейнер файлів
1 - 1 з 1
Вантажиться...
- Назва:
- TACS_2-1_2020_06.pdf
- Розмір:
- 535.83 KB
- Формат:
- Adobe Portable Document Format
- Опис:
Ліцензійна угода
1 - 1 з 1
Ескіз недоступний
- Назва:
- license.txt
- Розмір:
- 9.06 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: