Post - Quantum Cryptography Using Complexity Doctoral
نویسندگان
چکیده
In order to cope with new technologies such as quantum computing and the possibility of developing new algorithms, new cryptosystems should be developed based on a diverse set of unrelated complexity assumptions so that one technique will not break more than a handful of systems. As demonstrated by Shor in 1994, quantum algorithms are known to break traditional cryptosystems based on RSA and Diffie-Hellman. Therefore, post-quantum systems are needed to provide security should quantum computers become a reality. In this thesis, we develop two post-quantum cryptographic primitives: a symmetric-key cipher using two new cipher design techniques and a solution to the secure set membership problem. The new techniques in the symmetric-key cipher are polymorphic S-boxes and pseudo-independent subkeys. The secure set membership primitive includes a distributed protocol for set establishment and a proofof-possession protocol to show set membership without revealing the member of the set. The symmetric-key cipher is based on state-of-the-art cipher designs alongwith our new cipher design techniques. This makes its base properties predictable while adding what we believe to be new difficulties for the cryptanalyst. The polymorphic S-box technique may be used with new ciphers while existing ciphers may be retrofitted to use pseudo-independent subkeys. We use a subset of the instances of the 3SAT witness-finding problem in developing a new complexity assumption for the secure set membership primitive. It is risky to base cryptosystems onNP-complete problems, as what is hard in the worst
منابع مشابه
Post - Quantum Cryptography Using Complexity Doctoral Dissertation
In this thesis, we develop a cryptographic primitive: a solution to the secure set membership problem. The secure set membership problem is the problem of creating a set representation so that it is possible to verify that a string is a member of the set without being able to learn members of the set from the representation. The secure set membership primitive includes a distributed protocol fo...
متن کاملLearning with Errors is easy with quantum samples
Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography. In this work, we study the quantum sample complexity of Learning with Errors and show that there exists an efficient quantum learning algorithm (with polynomial sample and time complexity) for the Learning with Errors problem whe...
متن کاملClassical and Quantum Algorithms for Isogeny-based Cryptography
Isogeny-based cryptography using supersingular elliptic curves — most prominently, the constructions of De Feo-Jao-Plut — is one of the few practical candidates for post-quantum public key cryptography. Its formidable security claim is earned through the continual exploration of quantum algorithms for ‘isogeny problems’ and the assessment of the threat they pose to supersingular isogeny-based c...
متن کاملQuantum Key-recovery Attack on Feistel Structures
Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. In this paper, we study the Feistel constructions with Grover and Simon algorithms and give some new quantum key-recovery attacks on different rounds of Feistel constructions. Our attacks requires ...
متن کاملOn new multivariate cryptosystems based on hidden Eulerian equations over finite fields
We propose new multivariate cryptosystems over n-dimensional vector space over a finite field Fq based on idea of hidden discrete logarithm problem for F ∗ q. These cryptosystems are based on hidden eulerian equations x = a, (α, q − 1) = 1. The method is based on the idea of Eulerian transformations, which allow us to use asymmetric algorithms based on families of nonlinear multiplicatively inj...
متن کامل