Skip to main content

A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10143))

Abstract

Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. Under this background, a non-commuting cryptography class based on matrix power function has been given. In this paper we show that the non-commuting cryptography class based on MPF is vulnerable to a linear algebra attack which only requires polynomial time to achieve the equivalent keys respectively. In addition, we conduct an analysis on the flaws in this schemes and propose an improved scheme that remedies the weakness of their schemes.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Takagi, T.: Post-quantum cryptography. In: Proceedings of PQCrypto 2016, Fukuoka, Japan, pp. 1–245 (2016)

    Google Scholar 

  2. Faugere, J.C., Perret, L., De Portzamparc, F.: Algebraic attack against variants of McEliece with Goppa polynomial of a special form. In: Proceedings of Asiacrypt 2014, Kaoshiung, Taiwan, pp. 21–41 (2014)

    Google Scholar 

  3. Armknecht, F., Gagliardoni, T., Katzenbeisser, S., Peter, A.: General impossibility of group homomorphic encryption in the quantum world. In: Proceedings of Public Key Cryptography 2014, Buenos Aires, Argentina, pp. 556–573 (2014)

    Google Scholar 

  4. Mao, S.W., Zhang, H.G., Wu, W.Q., et al.: A resistant quantum key exchange protocol and its corresponding encryption scheme. China Commun. 11(9), 131–141 (2014)

    Article  Google Scholar 

  5. Tsaban, B.: Polynomial-time solutions of computational problems in noncommutative algebraic cryptography. J. Cryptology 28(3), 601–622 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  6. Zhang, H.G., Liu, J.H., Jia, J.W., et al.: A survey on applications of matrix decomposition in cryptography. J. Cryptologic Res. 1(4), 341–357 (2014)

    Google Scholar 

  7. Lyubashevsky, V., Prest, T.: Quadratic time, linear space algorithms for gram-schmidt orthogonalization and gaussian sampling in structured lattices. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 789–815. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46800-5_30

    Google Scholar 

  8. Wang, H.Z., Zhang, H.G., Wang, Z.Y., et al.: Extended multivariate public key cryptosystems with secure encryption function. Sci. China Inf. Sci. 6, 1161–1171 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  9. Ling, S., Phan, D.H., Stehlé, D., Steinfeld, R.: Hardness of k-LWE and applications in traitor tracing. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 315–334. Springer, Heidelberg (2014). doi:10.1007/978-3-662-44371-2_18

    Chapter  Google Scholar 

  10. Gaborit, P.: Proceedings of PQCrypto 2013, Limoges, France, pp. 1–200 (2013)

    Google Scholar 

  11. Braun, J., Buchmann, J., Mullan, C., Wiesmaier, A.: Long term confidentiality: a survey. Des. Codes Crypt. 71(3), 459–478 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  12. Liu, J.H., Zhang, H.G., Jia, J.W., et al.: Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem. Sci. China Inf. Sci. 59(5), 1–11 (2016)

    MathSciNet  Google Scholar 

  13. Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(110101), 1–43 (2015)

    MathSciNet  Google Scholar 

  14. Sakalauskas, E., Listopadskis, N., Tvarijonas, P.: Key agreement protocol (KAP) based on matrix power function. Advanced Studies in Software and Knowledge, Engineering, pp. 92–96 (2008)

    Google Scholar 

  15. Mihalkovich, A., Sakalauskas, E., Venckauskas, A.: New asymmetric cipher based on matrix power function and its implementation in microprocessors efficiency investigation. Elektronika ir Elektrotechnika 19(10), 119–122 (2013)

    Article  Google Scholar 

  16. Mihalkovich, A., Sakalauskas, E.: Asymmetric cipher based on MPF and its security parameters evaluation. In: Proceedings of the Lithuanian Mathematical Society, Series A, vol. 52, pp. 72–77 (2012)

    Google Scholar 

  17. Liu, J.H., Zhang, H.G., Jia, J.W., et al.: Cryptanalysis of HKKS key exchange protocols. Chin. J. Comput. 39(3), 516–528 (2016)

    MathSciNet  Google Scholar 

  18. Liu, M.J., Chen, J.Z.: Improved linear attacks on the Chinese block cipher standard. J. Comput. Sci. Technol. 29(6), 1123–1133 (2014)

    Article  MathSciNet  Google Scholar 

  19. Gashkov, S.B., Sergeev, I.S.: Complexity of computation in finite fields. J. Math. Sci. 191(5), 661–685 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  20. Zhao, J.Y., Wang, M.Q., Wen, L.: Improved linear cryptanalysis of CAST-256. J. Comput. Sci. Technol. 29(6), 1134–1139 (2014)

    Article  Google Scholar 

Download references

Acknowledgments

We want to thank the anonymous reviewers for their comments which helped to improve the paper. This work is supported by the National Natural Science Foundation of China (Grant Nos. 61303212, 61170080), the State Key Program of National Natural Science of China(Grant Nos. 61332019, U1135004), the Major Research Plan of the National Natural Science Foundation of China (Grant No. 91018008), the Hubei Natural Science Foundation of China (Grant Nos. 2011CDB453, 2014CFB440).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huanguo Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Liu, J., Zhang, H., Jia, J. (2017). A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power Function. In: Chen, K., Lin, D., Yung, M. (eds) Information Security and Cryptology. Inscrypt 2016. Lecture Notes in Computer Science(), vol 10143. Springer, Cham. https://doi.org/10.1007/978-3-319-54705-3_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54705-3_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54704-6

  • Online ISBN: 978-3-319-54705-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics