Cryptanalysis of Cryptosystems Based on Non-commutative Skew Polynomials

نویسندگان

  • Vivien Dubois
  • Jean-Gabriel Kammerer
چکیده

We describe an attack on the family of Diffie-Hellman and El-Gamal like cryptosystems recently presented at PQ Crypto 2010. We show that the reference hard problem is not hard. 1 Description of the Cryptosystems Skew polynomials are polynomials with a particular noncommutative inner product. Let Fq denote the finite field with q elements, and p be the characteristic of the field. Automorphisms of Fq are the so-called Frobenius maps which are powering to a power of p. Let θ be such an automorphism. We denote by ? the inner product of skew polynomials. It is defined inductively for all a ∈ Fq by X ? a = θ(a)X. The ring of skew polynomials is still a left and right Euclidean domain, that is, there are both a left and a right Euclidean division algorithm. Using the Euclidean algorithms we can thus compute left and right greatest common divisors. However, due to the noncommutativity of the inner product, skew polynomials admit many factorizations instead of a single one. The cardinality of the number of possible factorizations is expected to be exponential in the degree of the polynomial. Based on this property, the authors of [1] designed public key cryptosystems where the trapdoor information is knowing one particular factorization of a skew polynomial. However, for the purpose of the cryptosystem, both the public skew polynomial and its secret factorization must be of particular nature. At this point, it is not useful to describe the proposed cryptosystems. Instead, we simply show that the instance of the factoring problem arising in their cryptosystems is easy. This problem is the following. Let S be a randomly generated subset of skew polynomials whose elements commute with each others. This set is public information. Let Q be a randomly chosen polynomial with many factors of small degree which do not commute with the elements of S. This polynomial is also public information. In the Diffie-Hellman like protocol of [1], any participant randomly chooses two polynomials L and R which are generated from elements of S, and outputs P = L ? Q ? R. The cryptosystem relies on the intractability of extracting L and R from P . The rationale of the cryptosystem is that this particular factorization is lost among the exponentially numerous other ones.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Public Key Cryptosystems Using Polynomials over Non-commutative Rings

In this paper, we propose a new method for designing public key cryptosystems based on general non-commutative rings. The key idea of our proposal is that for a given non-commutative ring, we can define polynomials and take them as the underlying work structure. By doing so, it is easy to implement Diffie-Helman-like key exchange protocol. And consequently, ElGamal-like cryptosystems can be der...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials

In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (non-commutative) skew polynomials. The algorithm performs only polynomial multiplications in a special small field and is very efficient. The security of the scheme can be interpretated in terms of solving binary quadratic equations or exhaustive search of a set obtained through linear equations. W...

متن کامل

Polynomial Interpolation Problem for Skew Polynomials

Let R = K[x;σ] be a skew polynomial ring over a division ring K. We introduce the notion of derivatives of skew polynomial at scalars. An analogous definition of derivatives of commutative polynomials from K[x] as a function of K[x] → K[x] is not possible in a non-commutative case. This is the reason why we have to define the derivative of a skew polynomial at a scalar. Our definition is based ...

متن کامل

Skew and linearized Reed-Solomon codes and maximum sum rank distance codes over any division ring

Reed-Solomon codes and Gabidulin codes have maximum Hamming distance and maximum rank distance, respectively. A general construction using skew polynomials, called skew Reed-Solomon codes, has already been introduced in the literature. In this work, we introduce a linearized version of such codes, called linearized Reed-Solomon codes. We prove that they have maximum sum-rank distance. Such dist...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2010  شماره 

صفحات  -

تاریخ انتشار 2010