Cryptanalysis via Algebraic Spans Adi Ben-Zvi, Arkadius Kalka, and - - PowerPoint PPT Presentation

cryptanalysis via algebraic spans
SMART_READER_LITE
LIVE PREVIEW

Cryptanalysis via Algebraic Spans Adi Ben-Zvi, Arkadius Kalka, and - - PowerPoint PPT Presentation

Cryptanalysis via Algebraic Spans Adi Ben-Zvi, Arkadius Kalka, and Boaz Tsaban Bar-Ilan University Crypto 2018 PKC foundations are mainly abelian (and quantum insecure) PKC foundations are mainly abelian (and quantum insecure) DLP in finite


slide-1
SLIDE 1

Cryptanalysis via Algebraic Spans

Adi Ben-Zvi, Arkadius Kalka, and Boaz Tsaban Bar-Ilan University

Crypto 2018

slide-2
SLIDE 2

PKC foundations are mainly abelian (and quantum insecure)

slide-3
SLIDE 3

PKC foundations are mainly abelian (and quantum insecure)

DLP in finite fields (1976); Factorization (RSA, 1978). Poor performance vs security tradeoff; no long-term security. Subexp algorithms for DLP in some elliptic curves. Quantum computers break them all.

slide-4
SLIDE 4

PKC foundations are mainly abelian (and quantum insecure)

DLP in finite fields (1976); Factorization (RSA, 1978). Poor performance vs security tradeoff; no long-term security. Subexp algorithms for DLP in some elliptic curves. Quantum computers break them all. Options: (0) Abelian (DLP/RSA); (1) Lattices; (2) nonabelian groups/structures.

slide-5
SLIDE 5

PKC foundations are mainly abelian (and quantum insecure)

DLP in finite fields (1976); Factorization (RSA, 1978). Poor performance vs security tradeoff; no long-term security. Subexp algorithms for DLP in some elliptic curves. Quantum computers break them all. Options: (0) Abelian (DLP/RSA); (1) Lattices; (2) nonabelian groups/structures. The nonablian option must be explored. In particular, we need general cryptanalytic tools for nonabelian crypto.

slide-6
SLIDE 6

PKC foundations are mainly abelian (and quantum insecure)

DLP in finite fields (1976); Factorization (RSA, 1978). Poor performance vs security tradeoff; no long-term security. Subexp algorithms for DLP in some elliptic curves. Quantum computers break them all. Options: (0) Abelian (DLP/RSA); (1) Lattices; (2) nonabelian groups/structures. The nonablian option must be explored. In particular, we need general cryptanalytic tools for nonabelian crypto. Here: Algebraic Span Cryptanalysis.

slide-7
SLIDE 7

Conojugation in nonabelian groups

slide-8
SLIDE 8

Conojugation in nonabelian groups

For a, c ∈ G (nonabelian group), ac := c−1ac (conjugation).

slide-9
SLIDE 9

Conojugation in nonabelian groups

For a, c ∈ G (nonabelian group), ac := c−1ac (conjugation). Conjugation is an isomorphism: (a−1)c = (ac)−1 (ab)c = ac · bc. For a word v(x1, . . . , xk) in the variables x1, . . . , xk (e.g., x7x−1

3 x5):

v(ac

1, . . . , ac k) = v(a1, . . . , ak)c.

slide-10
SLIDE 10

Commutator KE (Anshel–Anshel–Goldfeld 1999)

slide-11
SLIDE 11

Commutator KE (Anshel–Anshel–Goldfeld 1999)

Alice Public Bob v(x1, . . . , xk) a1, . . . , ak ≤ G w(x1, . . . , xk) a = v(a1, . . . , ak) b1, . . . , bk ≤ G b = w(b1, . . . , bk) b1a , . . . , bka

  • a1b , . . . , akb
  • a−1v( a b

1 , . . . , a b k )

w( b a

1 , . . . , b a k )−1b

slide-12
SLIDE 12

Commutator KE (Anshel–Anshel–Goldfeld 1999)

Alice Public Bob v(x1, . . . , xk) a1, . . . , ak ≤ G w(x1, . . . , xk) a = v(a1, . . . , ak) b1, . . . , bk ≤ G b = w(b1, . . . , bk) b1a , . . . , bka

  • a1b , . . . , akb
  • a−1v( a b

1 , . . . , a b k )

w( b a

1 , . . . , b a k )−1b

a−1v(a b

1 , . . . , a b k ) = a−1ab = a−1b−1ab = (ba)−1b = w(b a 1 , . . . , b a k )−1b

slide-13
SLIDE 13

Linear equations from conjugations

slide-14
SLIDE 14

Linear equations from conjugations

Assume G ≤ GLn(F) (matrix representations).

slide-15
SLIDE 15

Linear equations from conjugations

Assume G ≤ GLn(F) (matrix representations). Given c = ba (a, b ∈ G): ba = a−1ba a · ba = ba Linear equations in the entries of the matrix a.

slide-16
SLIDE 16

Linear equations from conjugations

Assume G ≤ GLn(F) (matrix representations). Given c = ba (a, b ∈ G): ba = a−1ba a · ba = ba Linear equations in the entries of the matrix a. A solution ˜ a is invertible w.h.p. (Schwartz–Zippel). ˜ a · ba = b˜ a ba = ˜ a−1b˜ a ba = b˜

a

slide-17
SLIDE 17

Algebraic spans

slide-18
SLIDE 18

Algebraic spans

G ≤ GLn(F), a, b ∈ G. Can find ˜ a with ba = b˜

a by linear equations.

slide-19
SLIDE 19

Algebraic spans

G ≤ GLn(F), a, b ∈ G. Can find ˜ a with ba = b˜

a by linear equations.

˜ a / ∈ G! We can force ˜ a ∈ Alg(G) = spanF(G) ⊆ Mn(F), the algebra generated by G (because that’s a vector space.)

slide-20
SLIDE 20

Algebraic spans

G ≤ GLn(F), a, b ∈ G. Can find ˜ a with ba = b˜

a by linear equations.

˜ a / ∈ G! We can force ˜ a ∈ Alg(G) = spanF(G) ⊆ Mn(F), the algebra generated by G (because that’s a vector space.) For G = g1, . . . , gk ≤ GLn(F), finding a basis for Alg(G) by repeated multiplication by generators and Gauss elimination is O(kn6).

slide-21
SLIDE 21

Algebraic Span Cryptanalysis

slide-22
SLIDE 22

Algebraic Span Cryptanalysis

G1, . . . , Gk ≤ GLn(F); g1 ∈ G1, . . . , gk ∈ Gk. Given: linear equations on the entries of g1, . . . , gk. Need to find f (g1, . . . , gk).

slide-23
SLIDE 23

Algebraic Span Cryptanalysis

G1, . . . , Gk ≤ GLn(F); g1 ∈ G1, . . . , gk ∈ Gk. Given: linear equations on the entries of g1, . . . , gk. Need to find f (g1, . . . , gk). Instead of solving subject to g1 ∈ G1, . . . , gk ∈ Gk, (infeasible!) solve subject to the linear constraints g1 ∈ Alg(G1), . . . , gk ∈ Alg(Gk). Pray (or prove) that every solution ˜ g1, . . . , ˜ gk satisfies f (˜ g1, . . . , ˜ gk) = f (g1, . . . , gk).

slide-24
SLIDE 24

Application: Commutator KEP

slide-25
SLIDE 25

Application: Commutator KEP

a ∈ a1, . . . , ak, b ∈ b1, . . . , bk ≤ G ≤ GLn(F). Need: (b1a, . . . , bka, a1b, . . . , akb) → a−1b−1ab.

slide-26
SLIDE 26

Application: Commutator KEP

a ∈ a1, . . . , ak, b ∈ b1, . . . , bk ≤ G ≤ GLn(F). Need: (b1a, . . . , bka, a1b, . . . , akb) → a−1b−1ab. Solving linear equations, we obtain ˜ a ∈ Alg(a1, . . . , ak), ˜ b ∈ Alg(b1, . . . , bk) with b1˜

a

= b1a . . . bk ˜

a

= bka ; a1

˜ b

= a1b . . . ak

˜ b

= akb Since ˜ a ∈ Alg(a1, . . . , ak), ˜ a˜

b = ˜

  • ab. Similarly, b˜

a = ba.

˜ a−1˜ b−1˜ a˜ b = ˜ a−1˜ a˜

b = ˜

a−1˜ ab = ˜ a−1b−1˜ ab = (b˜

a)−1b = (ba)−1b = a−1b−1ab !

slide-27
SLIDE 27

Triple Decomposition KE (Kurt 2005)

Alice Public Bob a, a1, a2, x1, x2 A A1 A2 X1 X2 | | | | Y1 Y2 B1 B2 B ≤ G y1, y2, b1, b2, b ax1 , x−1

1 a1x2 , x−1 2 a2

  • b1y1 , y−1

1 b2y2 , y−1 2 b

  • a b1y1 a1 y−1

1 b2y2 a2 y−1 2 b = ab1a1b2a2b

  • K

= ax1 b1 x−1

1 a1x2 b2 x−1 2 a2 b

The triple products do not provide linear equations! (And without them we fail!)

slide-28
SLIDE 28

Cryptanalysis of Triple Dec KE

Alg(B1)y1 = Alg(B1) · b1y1 Alg(B2 ∪ Y2)y1 = Alg(B2 ∪ Y2) · y−1

2 b−1 2 y1 = Alg(B2 ∪ Y2) · y−1 1 b2y2 −1

Alg(A2)x2 = Alg(A2) · a−1

2 x2 = Alg(A2) · x−1 2 a2 −1

Alg(A1 ∪ X1)x2 = Alg(A1 ∪ X1) · x−1

1 a1x2

Pick invertible ˜ y1 ∈ Alg(Y1) ∩ Alg(B1)y1 ∩ Alg(B2 ∪ Y2)y1; ˜ x2 ∈ Alg(X2) ∩ Alg(A2)x2 ∩ Alg(A1 ∪ X1)x2. ax1 · b1y1 · ˜ y1−1 · x−1

1 a1x2 · ˜

x2−1 · ˜ y1 · y−1

1 b2y2 · ˜

x2 · x−1

2 a2 · y−1 2 b

Gives (intricate proof) ab1a1b2a2b = K! (Alternatively, could check empirically.)

slide-29
SLIDE 29

Final comments

slide-30
SLIDE 30

Final comments

Method also applies to: Nonabelian Diffie–Hellman (Ko–Lee–Cheon–Han–Kang–Park 2000), Centralizer KE (Shpilrain–Ushakov 2006), and some more.

slide-31
SLIDE 31

Final comments

Method also applies to: Nonabelian Diffie–Hellman (Ko–Lee–Cheon–Han–Kang–Park 2000), Centralizer KE (Shpilrain–Ushakov 2006), and some more. Not the end of nonabelian cryptography:

  • 1. Additional nonabelian proposals

(Dehornoy et al., Kalka, . . . ).

  • 2. Additional problems (CSP, Multiple CSP,. . . ) to build upon.
  • 3. Groups with no small-dim representations.
  • 4. The application of this method keeps getting harder as new systems emerge (cf.

recent cryptanalysis of Algebraic Eraser).

slide-32
SLIDE 32

Final comments

Method also applies to: Nonabelian Diffie–Hellman (Ko–Lee–Cheon–Han–Kang–Park 2000), Centralizer KE (Shpilrain–Ushakov 2006), and some more. Not the end of nonabelian cryptography:

  • 1. Additional nonabelian proposals

(Dehornoy et al., Kalka, . . . ).

  • 2. Additional problems (CSP, Multiple CSP,. . . ) to build upon.
  • 3. Groups with no small-dim representations.
  • 4. The application of this method keeps getting harder as new systems emerge (cf.

recent cryptanalysis of Algebraic Eraser). THANK YOU!