FAST (Harder Better) FAster STronger Cryptography 2020/02/19 - - PowerPoint PPT Presentation
FAST (Harder Better) FAster STronger Cryptography 2020/02/19 - - PowerPoint PPT Presentation
FAST (Harder Better) FAster STronger Cryptography 2020/02/19 Bordeaux Damien Robert quipe LFANT, Inria Bordeaux Sud-Ouest Goal Cryptology: Encryption; Authenticity; Integrity. asymmetric encryption, signatures, zero-knowledge
Goal
Cryptology: Encryption; Authenticity; Integrity. Public key cryptology is based on a one way (trapdoor) function ⇒ asymmetric encryption, signatures, zero-knowledge proofs… Goal: Improve and extend elliptic curve cryptography to Secure the Internet of Things; Prepare the next generation of cryptosystems able to resist to quantum computers.
Organisation
Joint team between LFANT (Lithe and fast algorithmic number theory) https://lfant.math.u-bordeaux.fr/ and PREMA (the Pole of Research in Mathematics and Applications in Africa) http://prmasi.org/; Project coordinators: Tony Ezome, Senior Lecturer/Researcher (Cames), University of Sciences and Technology of Masuku (USTM), and Damien Robert (CR Inria). PREMA is a Simon’s fundation project involving researchers in Cameroun, Gabon, Madagascar, Sénégal along with members in Cote d’Ivoire, Maroc, South Africa and international collaborators in Canada, France, the Netherlands, Singapore.
Results
Efficiency
Improving randomness extractions ([KSC+17; CS17]), pseudo-random generators and pseudo-random functions [MV17b]. Improving arithmetic and pairing on elliptic curves [GF18; FD17; Fou19; FPE19; MAF19; FD19]. Improving normal basis [ES19] Attribute based credentials [SCN19]
Post quantum cryptography
Pairing based signatures [MV17a] Isogenies: modular polynomials for cyclic isogenies between abelian surfaces [MR17], cyclic isogenies given their kernels [DJR+17].
Misc
Attacks [NF19] Arithmetic progression [CM17a; CM17b] Book chapter “Pairings” of the book “Guide to Pairing-Based Cryptography” [EJ17].
Work in progress:
Computing canonical lift of genus 2 curves; Better isogenies in the Hessian model [LF];
Results
PhDs
- T. M. Nountu. “Pseudo-Random Generators and Pseudo-Random Functions:
Cryptanalysis and Complexity Measures”. PhD thesis. Paris Sciences et Lettres, 2017 Aminatou Pecha Njiahouo. Recherche de primitive pour la cryptographie à base de couplage. PhD thesis, Université Paris 8 (France), December 8, 2017. Upcoming PhD thesis: M. Sall: ”Bases Normales, Groupes algébriques et arithmétiques des corps finis” at university Cheikh Anta Diop de Dakar. Upcoming PhD thesis: A. Maiga ”Canonical lift of genus 2 curves” at university Cheikh Anta Diop de Dakar.
Scientific activities for the years 2016–2020
Lots of short or longer visits; One joint workshop at the start; Organization of conferences; EMA “Mathématiques pour la Cryptographie Post-quantique et Mathématiques pour le Traitement du Signal” at the École Polytechnique de Thiès (Sénégal) from May 10 to May 23 2017 by Djiby Sow and Abdoul Asiz Ciss . Ecole Mathématique Africaine (from April 02 to 04 2018 at Franceville), http://prmasi.org/ african-mathematical-school-ams-from-april-02-to-april-14-2018-gabon/ by Tony Ezome; Aminatou Pecha organized a CIMPA school (form 2 to 12 July 2019) and the first meeting for women in Mathematics in Central Africa from 13 to 14 July 2019 at AIMS-Cameroon in Limbe. Tony Ezome made 4 Teaching stays (two in Burkina Faso, one in The Republic of Congo, and one in Senegal) to introduce Algebraic number theory and algebraic geometry to Master Students.
Assessment and Feedback
Lots of teaching and conferences. Four (upcoming) PhD (specific funding for PhD students); Helped opening masters in cryptography in Africa; No industrial collaborations; Not enough visible inter-parternship research collaborations; Lots of Visa problem; Administrative burden for long stays; Budget cutoff mid December for the last year.
Key exchange on a graph
a b c d e f g h i j k l m n
- p
q r s t u v w x y z
Key exchange on a graph
Alice starts from ‘a’, follow the path 001110, and get ‘w’.
a b c d e f g h i j k l m n
- p
q r s t u v w x y z
Key exchange on a graph
Bob starts from ‘a’, follow the path 101101, and get ‘l’.
a b c d e f g h i j k l m n
- p
q r s t u v w x y z
Key exchange on a graph
Alice starts from ‘l’, follow the path 001110, and get ‘g’.
a b c d e f g h i j k l m n
- p
q r s t u v w x y z
Key exchange on a graph
Bob starts from ‘w’, follow the path 101101, and get ‘g’.
a b c d e f g h i j k l m n
- p
q r s t u v w x y z
Key exchange on a graph
The full exchange:
a b c d e f g h i j k l m n
- p
q r s t u v w x y z
Key exchange on a graph
Bigger graph (62 nodes)
a b c d e f g h i j k l m n
- p
q r s t u v w x y z A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 1 2 3 4 5 6 7 8 9
Key exchange on a graph
Even bigger graph (676 nodes)
aa ab ac ad ae af ag ah ai aj ak al am an ao ap aq ar as at au av aw ax ay az ba bb bc bd be bf bg bh bi bj bk bl bm bn bo bp bq br bs bt bu bv bw bx by bz ca cb cc cd ce cf cg ch ci cj ck cl cm cn co cp cq cr cs ct cu cv cw cx cy cz da db dc dd de df dg dh di dj dk dl dm dn do dp dq dr ds dt du dv dw dx dy dz ea eb ec ed ee ef eg eh ei ej ek el em en eo ep eq er es et eu ev ew ex ey ez fa fb fc fd fe ff fg fh fi fj fk fl fm fn fo fp fq fr fs ft fu fv fw fx fy fz ga gb gc gd ge gf gg gh gi gj gk gl gm gn go gp gq gr gs gt gu gv gw gx gy gz ha hb hc hd he hf hg hh hi hj hk hl hm hn ho hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij ik il im in io ip iq ir is it iu iv iw ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr js jt ju jv jw jx jy jz ka kb kc kd ke kf kg kh ki kj kk kl km kn ko kp kq kr ks kt ku kv kw kx ky kz la lb lc ld le lf lg lh li lj lk ll lm ln lo lp lq lr ls lt lu lv lw lx ly lz ma mb mc md me mf mg mh mi mj mk ml mm mn mo mp mq mr ms mt mu mv mw mx my mz na nb nc nd ne nf ng nh ni nj nk nl nm nn no np nq nr ns nt nu nv nw nx ny nz
- a
- b
- c
- d
- e
- f
- g
- h
- i
- j
- k
- l
- m
- n
- p
- q
- r
- s
- t
- u
- v
- w
- x
- y
- z
pa pb pc pd pe pf pg ph pi pj pk pl pm pn po pp pq pr ps pt pu pv pw px py pz qa qb qc qd qe qf qg qh qi qj qk ql qm qn qo qp qq qr qs qt qu qv qw qx qy qz ra rb rc rd re rf rg rh ri rj rk rl rm rn ro rp rq rr rs rt ru rv rw rx ry rz sa sb sc sd se sf sg sh si sj sk sl sm sn so sp sq sr ss st su sv sw sx sy sz ta tb tc td te tf tg th ti tj tk tl tm tn to tp tq tr ts tt tu tv tw tx ty tz ua ub uc ud ue uf ug uh ui uj uk ul um un uo up uq ur us ut uu uv uw ux uy uz va vb vc vd ve vf vg vh vi vj vk vl vm vn vo vp vq vr vs vt vu vv vw vx vy vz wa wb wc wd we wf wg wh wi wj wk wl wm wn wo wp wq wr ws wt wu wv ww wx wy wz xa xb xc xd xe xf xg xh xi xj xk xl xm xn xo xp xq xr xs xt xu xv xw xx xy xz ya yb yc yd ye yf yg yh yi yj yk yl ym yn yo yp yq yr ys yt yu yv yw yx yy yz za zb zc zd ze zf zg zh zi zj zk zl zm zn zo zp zq zr zs zt zu zv zw zx zy zz
Elliptic curves isogeny key exchange (Couveignes, Rostovtsev and Stolbunov)
Use the horizontal isogeny graph of an ordinary elliptic curve E over q. This is in fact the Cayley graph of the class group of the endomorphism ring of E , which is an imaginary quadratic order. For cryptography, choose a curve such that the graph has 2256 nodes. [LF]: Faster isogenies in the Hessian model of elliptic curves. Cost for computing an ℓ = 2s + 1 isogeny in the Hessian model: from
(5s + 3)M + 4S + 8sC (Moody2019) to (3s + 3)M + 3S + 3sC .
Bibliography
- A. A. Ciss and D. Moody. “Arithmetic progressions on conics”. In:
Journal of integer sequences 20.2 (2017), p. 3 (cit. on p. 4).
- A. A. Ciss and D. Moody. “Geometric progressions on elliptic
curves”. In: Glasnik matematiki 52.1 (2017), pp. 1–10 (cit. on p. 4).
- A. A. Ciss and D. Sow. “Two-Source Randomness Extractors for
Elliptic Curves for Authenticated Key Exchange”. In: International Conference on Codes, Cryptology, and Information Security. Springer. 2017, pp. 85–95 (cit. on p. 4).
- A. Dudeanu, D. Jetchev, D. Robert, and M. Vuille. “Cyclic Isogenies
for Abelian Varieties with Real Multiplication”. working paper or
- preprint. Nov. 2017. URL:
https://hal.inria.fr/hal-01629829 (cit. on p. 4).
- N. El Mrabet and M. Joye. Guide to Pairing-Based Cryptography. CRC
Press, 2017 (cit. on p. 4).
- T. Ezome and M. Sall. “Normal bases from 1-dimensional algebraic
groups”. In: Journal of Symbolic Computation (2019) (cit. on p. 4).
- E. Fouotsa. “Parallelizing pairings on Hessian elliptic curves”. In:
Arab Journal of Mathematical Sciences 25.1 (2019), pp. 29–42 (cit. on
- p. 4).
- E. Fouotsa and O. Diao. “A Theta Model for Elliptic Curves”. In:
Mediterranean Journal of Mathematics 14.2 (2017), p. 65 (cit. on p. 4).
- E. Fouotsa and O. Diao. “Complete addition formulas on the level
four theta model of elliptic curves”. In: Afrika Matematika (2019),
- pp. 1–17 (cit. on p. 4).
- E. Fouotsa, A. Pecha, and N. El Mrabet. “Beta Weil pairing revisited”.
In: Afrika Matematika 30.3-4 (2019), pp. 371–388 (cit. on p. 4).
- L. Ghammam and E. Fouotsa. “Improving the computation of the
- ptimal ate pairing for a high security level”. In: Journal of Applied
Mathematics and Computing (2018), pp. 1–16 (cit. on p. 4).
- D. Kolyang, D. Sow, A. A. Ciss, and H. B. Tchapgnouo. “Two-sources
randomness extractors in finite fields and in elliptic curves”. In: REVUE AFRICAINE DE LA RECHERCHE EN INFORMATIQUE ET MATHÉMATIQUES APPLIQUÉES 24 (2017) (cit. on p. 4). P . B. F. Lontouo and E. Fouotsa. “Analogue of Vélu’s Formulas for Computing Isogenies over Hessian Model of Elliptic Curves”. In: () (cit. on pp. 4, 16).
- N. B. Mbiang, D. F. Aranha, and E. Fouotsa. “Computing the
Optimal Ate Pairing over Elliptic Curves with Embedding Degrees 54 and 48 at the 256-bit security level”. In: International Journal of Applied Cryptography (2019) (cit. on p. 4).
- T. Mefenza and D. Vergnaud. “Lattice Attacks on Pairing-Based
Signatures”. In: IMA International Conference on Cryptography and
- Coding. Springer. 2017, pp. 352–370 (cit. on p. 4).
- T. Mefenza and D. Vergnaud. “Polynomial interpolation of the
Naor–Reingold pseudo-random function”. In: Applicable Algebra in Engineering, Communication and Computing 28.3 (2017), pp. 237–255 (cit. on p. 4).
- E. Milio and D. Robert. “Modular polynomials on Hilbert surfaces”.
working paper or preprint. Sept. 2017. URL: https://hal.archives-ouvertes.fr/hal-01520262 (cit. on
- p. 4).
- A. Nitaj and E. Fouotsa. “A new attack on RSA and Demytko’s
elliptic curve cryptosystem”. In: Journal of Discrete Mathematical Sciences and Cryptography 22.3 (2019), pp. 391–409 (cit. on p. 4).
- T. M. Nountu. “Pseudo-Random Generators and Pseudo-Random
Functions: Cryptanalysis and Complexity Measures”. PhD thesis. Paris Sciences et Lettres, 2017 (cit. on p. 5).
- I. Sene, A. A. Ciss, and O. Niang. “I2PA: An Efficient ABC for IoT”. In: