Post - Quantum Cryptography Using Complexity Doctoral

نویسندگان

  • Michael de Mare
  • Rebecca N. Wright
  • Stephen L. Bloom
  • Susanne Wetzel
  • Robert Gilman
  • Josh Benaloh
چکیده

In order to cope with new technologies such as quantum computing and the possibility of developing new algorithms, new cryptosystems should be developed based on a diverse set of unrelated complexity assumptions so that one technique will not break more than a handful of systems. As demonstrated by Shor in 1994, quantum algorithms are known to break traditional cryptosystems based on RSA and Diffie-Hellman. Therefore, post-quantum systems are needed to provide security should quantum computers become a reality. In this thesis, we develop two post-quantum cryptographic primitives: a symmetric-key cipher using two new cipher design techniques and a solution to the secure set membership problem. The new techniques in the symmetric-key cipher are polymorphic S-boxes and pseudo-independent subkeys. The secure set membership primitive includes a distributed protocol for set establishment and a proofof-possession protocol to show set membership without revealing the member of the set. The symmetric-key cipher is based on state-of-the-art cipher designs alongwith our new cipher design techniques. This makes its base properties predictable while adding what we believe to be new difficulties for the cryptanalyst. The polymorphic S-box technique may be used with new ciphers while existing ciphers may be retrofitted to use pseudo-independent subkeys. We use a subset of the instances of the 3SAT witness-finding problem in developing a new complexity assumption for the secure set membership primitive. It is risky to base cryptosystems onNP-complete problems, as what is hard in the worst

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Post - Quantum Cryptography Using Complexity Doctoral Dissertation

In this thesis, we develop a cryptographic primitive: a solution to the secure set membership problem. The secure set membership problem is the problem of creating a set representation so that it is possible to verify that a string is a member of the set without being able to learn members of the set from the representation. The secure set membership primitive includes a distributed protocol fo...

متن کامل

Learning with Errors is easy with quantum samples

Learning with Errors is one of the fundamental problems in computational learning theory and has in the last years become the cornerstone of post-quantum cryptography. In this work, we study the quantum sample complexity of Learning with Errors and show that there exists an efficient quantum learning algorithm (with polynomial sample and time complexity) for the Learning with Errors problem whe...

متن کامل

Classical and Quantum Algorithms for Isogeny-based Cryptography

Isogeny-based cryptography using supersingular elliptic curves — most prominently, the constructions of De Feo-Jao-Plut — is one of the few practical candidates for post-quantum public key cryptography. Its formidable security claim is earned through the continual exploration of quantum algorithms for ‘isogeny problems’ and the assessment of the threat they pose to supersingular isogeny-based c...

متن کامل

Quantum Key-recovery Attack on Feistel Structures

Post-quantum cryptography has attracted much attention from worldwide cryptologists. At Asiacrypt 2017, Leander and May combines Grover and Simon algorithms to quantumly break FX-based block ciphers. In this paper, we study the Feistel constructions with Grover and Simon algorithms and give some new quantum key-recovery attacks on different rounds of Feistel constructions. Our attacks requires ...

متن کامل

On new multivariate cryptosystems based on hidden Eulerian equations over finite fields

We propose new multivariate cryptosystems over n-dimensional vector space over a finite field Fq based on idea of hidden discrete logarithm problem for F ∗ q. These cryptosystems are based on hidden eulerian equations x = a, (α, q − 1) = 1. The method is based on the idea of Eulerian transformations, which allow us to use asymmetric algorithms based on families of nonlinear multiplicatively inj...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012