Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro.

Slides:



Advertisements
Similar presentations
Chapter 3 Public Key Cryptography and Message authentication.
Advertisements

22C:19 Discrete Structures Integers and Modular Arithmetic
Public Key Encryption Algorithm
22C:19 Discrete Math Integers and Modular Arithmetic Fall 2010 Sukumar Ghosh.
By Claudia Fiorini, Enrico Martinelli, Fabio Massacci
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
7. Asymmetric encryption-
Elliptic curve arithmetic and applications to cryptography By Uros Abaz Supervised by Dr. Shaun Cooper and Dr. Andre Barczak.
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
Efficient generation of cryptographically strong elliptic curves Shahar Papini Michael Krel Instructor : Barukh Ziv 1.
YSLInformation Security -- Public-Key Cryptography1 Elliptic Curve Cryptography (ECC) For the same length of keys, faster than RSA For the same degree.
Elliptic Curve Cryptography (ECC) Mustafa Demirhan Bhaskar Anepu Ajit Kunjal.
RSA ( Rivest, Shamir, Adleman) Public Key Cryptosystem
The RSA Cryptosystem and Factoring Integers (II) Rong-Jaye Chen.
Co-operative Private Equality Test(CPET) Ronghua Li and Chuan-Kun Wu (received June 21, 2005; revised and accepted July 4, 2005) International Journal.
CS470, A.SelcukElGamal Cryptosystem1 ElGamal Cryptosystem and variants CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Efficient fault-tolerant scheme based on the RSA system Author: N.-Y. Lee and W.-L. Tsai IEE Proceedings Presented by 詹益誌 2004/03/02.
Dr. Lo’ai Tawalbeh Fall 2005 Chapter 10 – Key Management; Other Public Key Cryptosystems Dr. Lo’ai Tawalbeh Computer Engineering Department Jordan University.
WS Algorithmentheorie 03 – Randomized Algorithms (Public Key Cryptosystems) Prof. Dr. Th. Ottmann.
Introduction to Computer and Network Security Iliano Cervesato 26 August 2008 – Modern Cryptography.
ELECTRONIC PAYMENT SYSTEMSFALL 2001COPYRIGHT © 2001 MICHAEL I. SHAMOS Electronic Payment Systems Lecture 6 Epayment Security II.
1 NTRU: A Ring-Based Public Key Cryptosystem Jeffrey Hoffstein, Jill Pipher, Joseph H. Silverman LNCS 1423, 1998.
CPE5021 Advanced Network Security --- Advanced Cryptography: Elliptic Curve Cryptography --- Lecture 3 CPE5021 Advanced Network Security --- Advanced Cryptography:
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
ASYMMETRIC CIPHERS.
Public Key Model 8. Cryptography part 2.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
 Introduction  Requirements for RSA  Ingredients for RSA  RSA Algorithm  RSA Example  Problems on RSA.
1 CIS 5371 Cryptography 8. Asymmetric encryption-.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
10.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Symmetric-Key Cryptography.
1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
An Efficient Identity-based Cryptosystem for
RSA Ramki Thurimella.
Public Key Encryption and the RSA Public Key Algorithm CSCI 5857: Encoding and Encryption.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Midterm Review Cryptography & Network Security
Based on Bruce Schneier Chapter 7: Key Length Dulal C. Kar.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
The RSA Algorithm. Content Review of Encryption RSA An RSA example.
© 2013 Toshiba Corporation An Estimation of Computational Complexity for the Section Finding Problem on Algebraic Surfaces Chiho Mihara (TOSHIBA Corp.)
Understanding Cryptography by Christof Paar and Jan Pelzl These slides were prepared by Christof Paar and Jan Pelzl Chapter 8 –
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
22C:19 Discrete Structures Integers and Modular Arithmetic Fall 2014 Sukumar Ghosh.
Network Security Lecture 18 Presented by: Dr. Munam Ali Shah.
Scott CH Huang COM 5336 Cryptography Lecture 6 Public Key Cryptography & RSA Scott CH Huang COM 5336 Cryptography Lecture 6.
NEW DIRECTIONS IN CRYPTOGRAPHY Made Harta Dwijaksara, Yi Jae Park.
1 Section Congruences In short, a congruence relation is an equivalence relation on the carrier of an algebra such that the operations of the algebra.
PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 PUBLIC-KEY CRYPTOGRAPHY AND RSA – Chapter 9 Principles Applications Requirements RSA Algorithm Description.
Lecture 9 Elliptic Curves. In 1984, Hendrik Lenstra described an ingenious algorithm for factoring integers that relies on properties of elliptic curves.
11 RSA Variants.  Scheme ◦ Select s.t. p and q = 3 mod 4 ◦ n=pq, public key =n, private key =p,q ◦ y= e k (x)=x (x+b) mod n ◦ x=d k (y)=  y mod n.
Ruhr University Bochum Faculty of Mathematics Information-Security and Cryptology On the Security of HFE, HFEv- and Quartz Nicolas T. CourtoisMagnus DaumPatrick.
Introduction to Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Homework #2 J. H. Wang Oct. 31, 2012.
Diffie-Hellman Key Exchange first public-key type scheme proposed by Diffie & Hellman in 1976 along with the exposition of public key concepts – note:
Introduction to Elliptic Curve Cryptography CSCI 5857: Encoding and Encryption.
RSA Pubic Key Encryption CSCI 5857: Encoding and Encryption.
Ruhr University Bochum Faculty of Mathematics Information-Security and Cryptology Some new aspects concerning the Analysis of HFE type Cryptosystems Magnus.
1 Introduction to Information Security , Spring 2016 Lecture 4: Applied cryptography: asymmetric Zvi Ostfeld Slides credit: Eran Tromer.
Hard Problems Some problems are hard to solve.  No polynomial time algorithm is known.  E.g., NP-hard problems such as machine scheduling, bin packing,
Public Key Cryptography. Asymmetric encryption is a form of cryptosystem in which Encryption and decryption are performed using the different keys—one.
IEEE TRANSACTIONS ON INFORMATION THEORY, JULY 1985
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Solving Linear Systems Algebraically
The Application of Elliptic Curves Cryptography in Embedded Systems
Presentation transcript:

Copyright 2012, Toshiba Corporation. A Survey on the Algebraic Surface Cryptosystems Koichiro Akiyama ( TOSHIBA Corporation ) Joint work with Prof. Yasuhiro Goto 2013/03/02

2 Contents 1.Introduction Public key cryptosystem, Motivation 2.Section Finding Problem A Computational Hard Problem on Algebraic Surface 3.Algebraic Surface Public-key Cryptosystem Encryption/Decryption/Key Generation Algorithms 4.Known Attacks - Rational Point Attack - Ideal Factorization Attack 5.Conclusion and Future Research A Survey on the Algebraic Surface Cryptosystems

3 Contents 1.Introduction Public key cryptosystem, Motivation 2.Section Finding Problem A Computational Hard Problem on Algebraic Surface 3.Algebraic Surface Public-key Cryptosystem Encryption/Decryption/Key Generation Algorithms 4.Known Attacks - Rational Point Attack - Ideal Factorization Attack 5.Conclusion and Future Research A Survey on the Algebraic Surface Cryptosystems

4 sHueLjOl8k7 Public key Cryptosystem ( Concept ) B’s Public Key Ex. Integer Factorization Computational Hard Problem Security of public key cryptosystem relies on the the problem which is hard to compute. Hello World B’s Secret Key Hello World Sender A Receiver B A Survey on the Algebraic Surface Cryptosystems

5 Motivation Want to construct public-key cryptosystems having following features –Resistant against known attacks by quantum computer. ( Not based on the factorization or discrete logarithm problems. ) –Fast in process time & compact in size. –Based on a hard problem in algebraic geometry. Our target is an algebraic surface A Survey on the Algebraic Surface Cryptosystems

6 Comparison with other cryptosystems RSA Elliptic Curve Cryptosystem Multivariate Cryptosystems Fast & compact Algebraic Surface Cryptosystem (1) Short Public key (2) Higher Dimensional Equations Public key size : number of valuables higher degree (>3) equationsQuadratic equations A Survey on the Algebraic Surface Cryptosystems

7 This talk Easy for Quantum Computer Design Encryption Algorithm Next talk Construction for Public Key Cryptosystem Selection of Hard Problem Call for Attack Start Define the secure parameters Elementary Algorithm Optimized Algorithms Practical implementation Improvement Attack Success! Security Proof Size of the parameter Hardness Security requirement RSA Cryptosystem Factoring Problem Easy Hard Algebraic Surface Cryptosystem Hard even for Quantum Computer Easy Section Hard The Section Finding Problem Algebraic Surface Secure parameter A Survey on the Algebraic Surface Cryptosystems

8 Contents 1.Introduction Public key cryptosystem, Motivation 2.Section Finding Problem A Computational Hard Problem on Algebraic Surface 3.Algebraic Surface Public-key Cryptosystem Encryption/Decryption/Key Generation Algorithms 4.Known Attacks - Rational Point Attack - Ideal Factorization Attack 5.Conclusion and Future Research A Survey on the Algebraic Surface Cryptosystems

9 Algebraic Surface An algebraic surface (we use) is a 2-dimensional affine algebraic variety with fibration. We consider algebraic surfaces defined over a finite field. where is small enough to calculate, but need not be 2. A Survey on the Algebraic Surface Cryptosystems

10 Section Finding Problem ( SFP ) Algebraic Surface section hard easy A Survey on the Algebraic Surface Cryptosystems

11 General Solution of SFP To solve the SFP, we put the section as follows: ( are variables ) The SFP is reduced to multivariable equations Substitute into, we obtain A Survey on the Algebraic Surface Cryptosystems

12 Contents 1.Introduction Public key cryptosystem, Motivation 2.Section Finding Problem A Computational Hard Problem on Algebraic Surface 3.Algebraic Surface Public-key Cryptosystem Encryption/Decryption/Key Generation Algorithms 4.Known Attacks - Rational Point Attack - Ideal Factorization Attack 5.Conclusion and Future Research A Survey on the Algebraic Surface Cryptosystems

13 ( are given ) Keys 1.System parameters –Size of finite field : prime –Degree of section : 2.Public key –Algebraic surface –Form of the plaintext polynomial –Form of the divisor polynomial 3.Secret key –Section (example) ( are given ) A Survey on the Algebraic Surface Cryptosystems

14 Form of the plaintext polynomial For example, and Form described the formula as fllows: indicates an element of are designated. A Survey on the Algebraic Surface Cryptosystems

15 plaintext m embedded to m(x,y,t) In the case of In the case of plaintext must be divided into 2bits block So the plaintext described as Therefore m embedded to m(x,y,t) as coefficients A Survey on the Algebraic Surface Cryptosystems

16 Encryption Random polynomial Divisor polynomial Public Key : algebraic surface Randomize ( operations ) message embed Message poly. Cipher text A Survey on the Algebraic Surface Cryptosystems

17 Decryption Secret key: Section message polynomial Cipher factoring Section substitute message Public key PlaintextRandom Solve linear equations Random A Survey on the Algebraic Surface Cryptosystems

18 Key generation Public key: algebraic surface Coefficients other than constant term Secret key : section Select randomly Calculate the constant term A Survey on the Algebraic Surface Cryptosystems

19 Contents 1.Introduction Public key cryptosystem, Motivation 2.Section Finding Problem A Computational Hard Problem on Algebraic Surface 3.Algebraic Surface Public-key Cryptosystem Encryption/Decryption/Key Generation Algorithms 4.Known Attacks - Rational Point Attack - Ideal Factorization Attack 5.Conclusion and Future Research A Survey on the Algebraic Surface Cryptosystems

20 Rational point attack ( 1 ) where subtract Remove the plaintext polynomial A Survey on the Algebraic Surface Cryptosystems

21 Rational point attack ( 2 ) substitution = construct Solve Linear Equation factoring extract Success! rational points A Survey on the Algebraic Surface Cryptosystems

22 Rational point attack ( 3 ) = = substitution reconstruct Solve linear equations rational points A Survey on the Algebraic Surface Cryptosystems

23 which is in the same form of and satisfy. If is a solution, there exists polynomial For arbitrary which is in the same form of, We can avoid the attack, when we select the form of which has enough polynomials not to be able to identify the correct one. Counter measure against RPA = and are in the same form This is also another solution A Survey on the Algebraic Surface Cryptosystems

24 Ideal factorization attack Cipher text Ideal Factoring where Solve Linear Eq. A Survey on the Algebraic Surface Cryptosystems

25 Sequence of events on ASC Jan st version was proposed in domestic conference May st version was presented in international conference PQC2006 Jintai Ding pointed out a flaw in our system Oct nd version was presented in AMS conference.. Jan 2007 Shigenori Uchiyama proposed an attack against 2 nd version. Apr 2007 Felipe Voloch proposed another attack against 2 nd version Jan rd version was proposed in domestic conference. Mar rd was presented in international conference PKC2009 May 2010 Jean-Charles Faugere( INRIA ) proposed an attack against 3rd version. Now We are preparing 4 th version whose security is equivalent to SFP. A Survey on the Algebraic Surface Cryptosystems

26 Contents 1.Introduction Public key cryptosystem, Motivation 2.Section Finding Problem A Computational Hard Problem on Algebraic Surface 3.Algebraic Surface Public-key Cryptosystem Encryption/Decryption/Key Generation Algorithms 4.Known Attacks - Rational Point Attack - Ideal Factorization Attack 5.Conclusion and Future Research A Survey on the Algebraic Surface Cryptosystems

27 Conclusions We showed a new type of public-key cryptosystem using an algebraic surface. –We showed the algorithm for encryption, decryption and key generation. Our contributions are –The public key size is O(n). –Our cryptosystem is associated higher general equations than multivariate cryptosystems. ( contains equation which degree is more than 3) A Survey on the Algebraic Surface Cryptosystems

28 Next Talk Construct a secure algorithm –We try to construct a provable secure cryptosystem Determine the recommendable parameter size –We developed an efficient algorithm to solve the SFP. –Now we estimate computational complexity by computational experimentation. Open Problems A Survey on the Algebraic Surface Cryptosystems

29The Algebraic Surface Cryptosystem and its security