Abstract
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. Under this background, a non-commuting cryptography class based on matrix power function has been given. In this paper we show that the non-commuting cryptography class based on MPF is vulnerable to a linear algebra attack which only requires polynomial time to achieve the equivalent keys respectively. In addition, we conduct an analysis on the flaws in this schemes and propose an improved scheme that remedies the weakness of their schemes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Takagi, T.: Post-quantum cryptography. In: Proceedings of PQCrypto 2016, Fukuoka, Japan, pp. 1–245 (2016)
Faugere, J.C., Perret, L., De Portzamparc, F.: Algebraic attack against variants of McEliece with Goppa polynomial of a special form. In: Proceedings of Asiacrypt 2014, Kaoshiung, Taiwan, pp. 21–41 (2014)
Armknecht, F., Gagliardoni, T., Katzenbeisser, S., Peter, A.: General impossibility of group homomorphic encryption in the quantum world. In: Proceedings of Public Key Cryptography 2014, Buenos Aires, Argentina, pp. 556–573 (2014)
Mao, S.W., Zhang, H.G., Wu, W.Q., et al.: A resistant quantum key exchange protocol and its corresponding encryption scheme. China Commun. 11(9), 131–141 (2014)
Tsaban, B.: Polynomial-time solutions of computational problems in noncommutative algebraic cryptography. J. Cryptology 28(3), 601–622 (2015)
Zhang, H.G., Liu, J.H., Jia, J.W., et al.: A survey on applications of matrix decomposition in cryptography. J. Cryptologic Res. 1(4), 341–357 (2014)
Lyubashevsky, V., Prest, T.: Quadratic time, linear space algorithms for gram-schmidt orthogonalization and gaussian sampling in structured lattices. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 789–815. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46800-5_30
Wang, H.Z., Zhang, H.G., Wang, Z.Y., et al.: Extended multivariate public key cryptosystems with secure encryption function. Sci. China Inf. Sci. 6, 1161–1171 (2011)
Ling, S., Phan, D.H., Stehlé, D., Steinfeld, R.: Hardness of k-LWE and applications in traitor tracing. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 315–334. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44371-2_18
Gaborit, P.: Proceedings of PQCrypto 2013, Limoges, France, pp. 1–200 (2013)
Braun, J., Buchmann, J., Mullan, C., Wiesmaier, A.: Long term confidentiality: a survey. Des. Codes Crypt. 71(3), 459–478 (2014)
Liu, J.H., Zhang, H.G., Jia, J.W., et al.: Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem. Sci. China Inf. Sci. 59(5), 1–11 (2016)
Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(110101), 1–43 (2015)
Sakalauskas, E., Listopadskis, N., Tvarijonas, P.: Key agreement protocol (KAP) based on matrix power function. Advanced Studies in Software and Knowledge, Engineering, pp. 92–96 (2008)
Mihalkovich, A., Sakalauskas, E., Venckauskas, A.: New asymmetric cipher based on matrix power function and its implementation in microprocessors efficiency investigation. Elektronika ir Elektrotechnika 19(10), 119–122 (2013)
Mihalkovich, A., Sakalauskas, E.: Asymmetric cipher based on MPF and its security parameters evaluation. In: Proceedings of the Lithuanian Mathematical Society, Series A, vol. 52, pp. 72–77 (2012)
Liu, J.H., Zhang, H.G., Jia, J.W., et al.: Cryptanalysis of HKKS key exchange protocols. Chin. J. Comput. 39(3), 516–528 (2016)
Liu, M.J., Chen, J.Z.: Improved linear attacks on the Chinese block cipher standard. J. Comput. Sci. Technol. 29(6), 1123–1133 (2014)
Gashkov, S.B., Sergeev, I.S.: Complexity of computation in finite fields. J. Math. Sci. 191(5), 661–685 (2013)
Zhao, J.Y., Wang, M.Q., Wen, L.: Improved linear cryptanalysis of CAST-256. J. Comput. Sci. Technol. 29(6), 1134–1139 (2014)
Acknowledgments
We want to thank the anonymous reviewers for their comments which helped to improve the paper. This work is supported by the National Natural Science Foundation of China (Grant Nos. 61303212, 61170080), the State Key Program of National Natural Science of China(Grant Nos. 61332019, U1135004), the Major Research Plan of the National Natural Science Foundation of China (Grant No. 91018008), the Hubei Natural Science Foundation of China (Grant Nos. 2011CDB453, 2014CFB440).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Liu, J., Zhang, H., Jia, J. (2017). A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function. In: Chen, K., Lin, D., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2016. Lecture Notes in Computer Science(), vol 10143. Springer, Cham. https://doi.org/10.1007/978-3-319-54705-3_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-54705-3_21
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54704-6
Online ISBN: 978-3-319-54705-3
eBook Packages: Computer ScienceComputer Science (R0)