group theory and cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfgroup theory and...

86
Group Theory and Cryptography Simon R. Blackburn Joint work with Carlos Cid, Ciaran Mullan 10th June 2010 Simon R. Blackburn (RHUL) Group Theory and Cryptography 1 / 20

Upload: others

Post on 07-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Group Theory and Cryptography

Simon R. Blackburn

Joint work with Carlos Cid, Ciaran Mullan

1

Standard logo

The logo should be reproduced in the primary colour, Pantone 660c, on all publications printed in two or more colours. Refer to the ‘Branded merchandise’ sheet for guidelines on use on promotional items etc.

The text, ‘University of London’, is set as a 50% of the blue background.

Do not use a keyline – see ‘Non standard backgrounds’ for exceptions.

The College name has been specially drawn; please use the original digital artwork and do not try to re-set.

xx

x

Clear area

No graphic or text should be placed in an area around the logo equivalent to the width of the base of the clock tower silhouette, as shown.

≤ 30mmMinimum size

The logo should be never be reproduced at less than 30mm in width. The text, ‘University of London’, should be reproduced as 100% white, no tints.

Printing on absorbent and unusual surfaces

The text, ‘University of London’, should be reproduced as 100% white, no tints, when it is printed on absorbent paper, i.e. newsprint, or any unusual surface, i.e. metal, fabric or plastic.

Non standard backgrounds

A white keyline should be placed around the logo if the logo is placed on a background other than white.

The width of the keyline is the width of the letter ‘l’.

x

x

Royal Holloway logo guidelines

Reversed logo

A reversed logo may be used when a one colour logo is required on a mid to dark colour background.

Refer to the ‘Branded merchandise’ sheet for guidelines on use on promotional items etc.

The background colour shows through the ‘Royal Holloway’ text and the clock tower silhouette. The text ‘University of London’ is a 50% tint of the background colour.

10th June 2010

Simon R. Blackburn (RHUL) Group Theory and Cryptography 1 / 20

Page 2: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Overview

1 The Discrete Log Problem

2 The DLP and groups

3 Logarithmic signatures

4 MST3

Simon R. Blackburn (RHUL) Group Theory and Cryptography 2 / 20

Page 3: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Discrete logarithm problem

Let G be a group (represented in some specified way). For example, let pbe a prime and let G = Z∗p.

The Discrete Logarithm Problem (DLP): Given g , h ∈ G , find an integer x(if it exists) such that h = g x .

When G = Z∗p, this seems to be a hard computational problem (forlarge p).

Taking G the group of points of an elliptic curve is thought to bemore secure (no ‘index-calculus’).

The DLP makes sense for any group. But it’s really about cyclicgroups, since we can replace G by 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 3 / 20

Page 4: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Discrete logarithm problem

Let G be a group (represented in some specified way). For example, let pbe a prime and let G = Z∗p.

The Discrete Logarithm Problem (DLP): Given g , h ∈ G , find an integer x(if it exists) such that h = g x .

When G = Z∗p, this seems to be a hard computational problem (forlarge p).

Taking G the group of points of an elliptic curve is thought to bemore secure (no ‘index-calculus’).

The DLP makes sense for any group. But it’s really about cyclicgroups, since we can replace G by 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 3 / 20

Page 5: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Discrete logarithm problem

Let G be a group (represented in some specified way). For example, let pbe a prime and let G = Z∗p.

The Discrete Logarithm Problem (DLP): Given g , h ∈ G , find an integer x(if it exists) such that h = g x .

When G = Z∗p, this seems to be a hard computational problem (forlarge p).

Taking G the group of points of an elliptic curve is thought to bemore secure (no ‘index-calculus’).

The DLP makes sense for any group. But it’s really about cyclicgroups, since we can replace G by 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 3 / 20

Page 6: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Discrete logarithm problem

Let G be a group (represented in some specified way). For example, let pbe a prime and let G = Z∗p.

The Discrete Logarithm Problem (DLP): Given g , h ∈ G , find an integer x(if it exists) such that h = g x .

When G = Z∗p, this seems to be a hard computational problem (forlarge p).

Taking G the group of points of an elliptic curve is thought to bemore secure (no ‘index-calculus’).

The DLP makes sense for any group. But it’s really about cyclicgroups, since we can replace G by 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 3 / 20

Page 7: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Discrete logarithm problem

Let G be a group (represented in some specified way). For example, let pbe a prime and let G = Z∗p.

The Discrete Logarithm Problem (DLP): Given g , h ∈ G , find an integer x(if it exists) such that h = g x .

When G = Z∗p, this seems to be a hard computational problem (forlarge p).

Taking G the group of points of an elliptic curve is thought to bemore secure (no ‘index-calculus’).

The DLP makes sense for any group. But it’s really about cyclicgroups, since we can replace G by 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 3 / 20

Page 8: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 9: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 10: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 11: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 12: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 13: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 14: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Diffie-Hellman key exchange

Suppose Alice and Bob want to agree on a random key K .They decide upon a large prime p and some g ∈ G = Z∗p and perform thefollowing protocol:

Alice chooses a random integer 0 ≤ a < |G | and sends c1 = ga toBob.

Bob chooses a random integer 0 ≤ b < |G | and sends c2 = gb toAlice.

On receiving c2 Alice computes K = ca2 .

On receiving c1 Bob computes K = cb1 .

Alice and Bob both share the same key K = gab.

Alice and Bob have the same key: (ga)b = (gb)a.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 4 / 20

Page 15: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Finding hard instances of the DLP?

The DLP makes sense for any cyclic group.

The DLP seems hard sometimes: G = Z∗p, or G = E (Fq).

But not always hard: G = (Zp,+).

Another bad idea: G ≤ GL(n, q).

But what about non-abelian groups?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 5 / 20

Page 16: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Finding hard instances of the DLP?

The DLP makes sense for any cyclic group.

The DLP seems hard sometimes: G = Z∗p, or G = E (Fq).

But not always hard: G = (Zp,+).

Another bad idea: G ≤ GL(n, q).

But what about non-abelian groups?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 5 / 20

Page 17: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Finding hard instances of the DLP?

The DLP makes sense for any cyclic group.

The DLP seems hard sometimes: G = Z∗p, or G = E (Fq).

But not always hard: G = (Zp,+).

Another bad idea: G ≤ GL(n, q).

But what about non-abelian groups?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 5 / 20

Page 18: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Finding hard instances of the DLP?

The DLP makes sense for any cyclic group.

The DLP seems hard sometimes: G = Z∗p, or G = E (Fq).

But not always hard: G = (Zp,+).

Another bad idea: G ≤ GL(n, q).

But what about non-abelian groups?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 5 / 20

Page 19: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Finding hard instances of the DLP?

The DLP makes sense for any cyclic group.

The DLP seems hard sometimes: G = Z∗p, or G = E (Fq).

But not always hard: G = (Zp,+).

Another bad idea: G ≤ GL(n, q).

But what about non-abelian groups?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 5 / 20

Page 20: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Ko Lee Cheon Han Kang Park

Let G be a (non-abelian) group. For a, g ∈ G define

ga = a−1ga.

Problem: (ga)b 6= (gb)a, in general.

Solution: Choose a ∈ A ≤ G and b ∈ B ≤ G where [A,B] = {1}.How do you choose a group G and subgroups A and B?

Ko et al. suggest using a braid group.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 6 / 20

Page 21: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Ko Lee Cheon Han Kang Park

Let G be a (non-abelian) group. For a, g ∈ G define

ga = a−1ga.

Problem: (ga)b 6= (gb)a, in general.

Solution: Choose a ∈ A ≤ G and b ∈ B ≤ G where [A,B] = {1}.How do you choose a group G and subgroups A and B?

Ko et al. suggest using a braid group.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 6 / 20

Page 22: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Ko Lee Cheon Han Kang Park

Let G be a (non-abelian) group. For a, g ∈ G define

ga = a−1ga.

Problem: (ga)b 6= (gb)a, in general.

Solution: Choose a ∈ A ≤ G and b ∈ B ≤ G where [A,B] = {1}.

How do you choose a group G and subgroups A and B?

Ko et al. suggest using a braid group.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 6 / 20

Page 23: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Ko Lee Cheon Han Kang Park

Let G be a (non-abelian) group. For a, g ∈ G define

ga = a−1ga.

Problem: (ga)b 6= (gb)a, in general.

Solution: Choose a ∈ A ≤ G and b ∈ B ≤ G where [A,B] = {1}.How do you choose a group G and subgroups A and B?

Ko et al. suggest using a braid group.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 6 / 20

Page 24: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Ko Lee Cheon Han Kang Park

Let G be a (non-abelian) group. For a, g ∈ G define

ga = a−1ga.

Problem: (ga)b 6= (gb)a, in general.

Solution: Choose a ∈ A ≤ G and b ∈ B ≤ G where [A,B] = {1}.How do you choose a group G and subgroups A and B?

Ko et al. suggest using a braid group.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 6 / 20

Page 25: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Braid group cryptography

How difficult is the conjugacy search problem?

There’s a nice survey: ‘Braid based cryptography’ by PatrickDehornoy.

Length based attacks work for many instances.

How can we generate hard instances?

There are no braid based schemes that are competitive with (say)elliptic curve DLP-based schemes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 7 / 20

Page 26: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Braid group cryptography

How difficult is the conjugacy search problem?

There’s a nice survey: ‘Braid based cryptography’ by PatrickDehornoy.

Length based attacks work for many instances.

How can we generate hard instances?

There are no braid based schemes that are competitive with (say)elliptic curve DLP-based schemes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 7 / 20

Page 27: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Braid group cryptography

How difficult is the conjugacy search problem?

There’s a nice survey: ‘Braid based cryptography’ by PatrickDehornoy.

Length based attacks work for many instances.

How can we generate hard instances?

There are no braid based schemes that are competitive with (say)elliptic curve DLP-based schemes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 7 / 20

Page 28: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Braid group cryptography

How difficult is the conjugacy search problem?

There’s a nice survey: ‘Braid based cryptography’ by PatrickDehornoy.

Length based attacks work for many instances.

How can we generate hard instances?

There are no braid based schemes that are competitive with (say)elliptic curve DLP-based schemes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 7 / 20

Page 29: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Let G be a group generated by x1, x2, . . . , xn.

Alice chooses a product a ∈ G of generators and their inverses:

a = xε1i1xε2i2· · · xεkik

with ij ∈ {1, 2, . . . , n} and εj = ±1.

Alice sends xa1 , x

a2 , . . . , x

an to Bob.

Bob chooses b ∈ G and sends xb1 , x

b2 , . . . , x

bn to Alice.

Common key:[a, b] = a−1b−1ab.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 8 / 20

Page 30: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Let G be a group generated by x1, x2, . . . , xn.

Alice chooses a product a ∈ G of generators and their inverses:

a = xε1i1xε2i2· · · xεkik

with ij ∈ {1, 2, . . . , n} and εj = ±1.

Alice sends xa1 , x

a2 , . . . , x

an to Bob.

Bob chooses b ∈ G and sends xb1 , x

b2 , . . . , x

bn to Alice.

Common key:[a, b] = a−1b−1ab.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 8 / 20

Page 31: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Let G be a group generated by x1, x2, . . . , xn.

Alice chooses a product a ∈ G of generators and their inverses:

a = xε1i1xε2i2· · · xεkik

with ij ∈ {1, 2, . . . , n} and εj = ±1.

Alice sends xa1 , x

a2 , . . . , x

an to Bob.

Bob chooses b ∈ G and sends xb1 , x

b2 , . . . , x

bn to Alice.

Common key:[a, b] = a−1b−1ab.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 8 / 20

Page 32: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Let G be a group generated by x1, x2, . . . , xn.

Alice chooses a product a ∈ G of generators and their inverses:

a = xε1i1xε2i2· · · xεkik

with ij ∈ {1, 2, . . . , n} and εj = ±1.

Alice sends xa1 , x

a2 , . . . , x

an to Bob.

Bob chooses b ∈ G and sends xb1 , x

b2 , . . . , x

bn to Alice.

Common key:[a, b] = a−1b−1ab.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 8 / 20

Page 33: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Let G be a group generated by x1, x2, . . . , xn.

Alice chooses a product a ∈ G of generators and their inverses:

a = xε1i1xε2i2· · · xεkik

with ij ∈ {1, 2, . . . , n} and εj = ±1.

Alice sends xa1 , x

a2 , . . . , x

an to Bob.

Bob chooses b ∈ G and sends xb1 , x

b2 , . . . , x

bn to Alice.

Common key:[a, b] = a−1b−1ab.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 8 / 20

Page 34: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Let G be a group generated by x1, x2, . . . , xn.

Alice chooses a product a ∈ G of generators and their inverses:

a = xε1i1xε2i2· · · xεkik

with ij ∈ {1, 2, . . . , n} and εj = ±1.

Alice sends xa1 , x

a2 , . . . , x

an to Bob.

Bob chooses b ∈ G and sends xb1 , x

b2 , . . . , x

bn to Alice.

Common key:[a, b] = a−1b−1ab.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 8 / 20

Page 35: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Why can Alice calculate [a, b]?

She knows

b−1ab = (b−1xi1b)ε1(b−1xi2b)ε2 · · · (b−1xik b)εk .

So she knows a−1(b−1ab) = [a, b].

Similarly: Bob knows a−1ba, so knows a−1b−1a, so knows(a−1b−1a)b = [a, b].

Simon R. Blackburn (RHUL) Group Theory and Cryptography 9 / 20

Page 36: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Why can Alice calculate [a, b]?

She knows

b−1ab = (b−1xi1b)ε1(b−1xi2b)ε2 · · · (b−1xik b)εk .

So she knows a−1(b−1ab) = [a, b].

Similarly: Bob knows a−1ba, so knows a−1b−1a, so knows(a−1b−1a)b = [a, b].

Simon R. Blackburn (RHUL) Group Theory and Cryptography 9 / 20

Page 37: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Why can Alice calculate [a, b]?

She knows

b−1ab = (b−1xi1b)ε1(b−1xi2b)ε2 · · · (b−1xik b)εk .

So she knows a−1(b−1ab) = [a, b].

Similarly: Bob knows a−1ba, so knows a−1b−1a, so knows(a−1b−1a)b = [a, b].

Simon R. Blackburn (RHUL) Group Theory and Cryptography 9 / 20

Page 38: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Why can Alice calculate [a, b]?

She knows

b−1ab = (b−1xi1b)ε1(b−1xi2b)ε2 · · · (b−1xik b)εk .

So she knows a−1(b−1ab) = [a, b].

Similarly: Bob knows a−1ba,

so knows a−1b−1a, so knows(a−1b−1a)b = [a, b].

Simon R. Blackburn (RHUL) Group Theory and Cryptography 9 / 20

Page 39: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Why can Alice calculate [a, b]?

She knows

b−1ab = (b−1xi1b)ε1(b−1xi2b)ε2 · · · (b−1xik b)εk .

So she knows a−1(b−1ab) = [a, b].

Similarly: Bob knows a−1ba, so knows a−1b−1a,

so knows(a−1b−1a)b = [a, b].

Simon R. Blackburn (RHUL) Group Theory and Cryptography 9 / 20

Page 40: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Anshel, Anshel, Goldfeld

Why can Alice calculate [a, b]?

She knows

b−1ab = (b−1xi1b)ε1(b−1xi2b)ε2 · · · (b−1xik b)εk .

So she knows a−1(b−1ab) = [a, b].

Similarly: Bob knows a−1ba, so knows a−1b−1a, so knows(a−1b−1a)b = [a, b].

Simon R. Blackburn (RHUL) Group Theory and Cryptography 9 / 20

Page 41: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Covers

A cover is an (ordered) collection of sets

A1,A2, . . . ,As ⊆ G

such that for all h ∈ Gh = a1a2 · · · as

in at least one way, where ai ∈ Ai .

Example in G = Z32:

A1 = {000, 001, 100, 101} A2 = {000, 111, 011}.

This generalises the DLP:

Ai = {1, g2i} for 1 ≤ i ≤ log2 |〈g〉|.

is a cover for 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 10 / 20

Page 42: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Covers

A cover is an (ordered) collection of sets

A1,A2, . . . ,As ⊆ G

such that for all h ∈ Gh = a1a2 · · · as

in at least one way, where ai ∈ Ai .

Example in G = Z32:

A1 = {000, 001, 100, 101} A2 = {000, 111, 011}.

This generalises the DLP:

Ai = {1, g2i} for 1 ≤ i ≤ log2 |〈g〉|.

is a cover for 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 10 / 20

Page 43: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Covers

A cover is an (ordered) collection of sets

A1,A2, . . . ,As ⊆ G

such that for all h ∈ Gh = a1a2 · · · as

in at least one way, where ai ∈ Ai .

Example in G = Z32:

A1 = {000, 001, 100, 101} A2 = {000, 111, 011}.

This generalises the DLP:

Ai = {1, g2i} for 1 ≤ i ≤ log2 |〈g〉|.

is a cover for 〈g〉.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 10 / 20

Page 44: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

A logarithmic signature or factorisation is an (ordered) collection ofsets

A1,A2, . . . ,As ⊆ G

such that for all h ∈ Gh = a1a2 · · · as

in exactly one way, where ai ∈ Ai .

Example in G = Z32:

A1 = {000, 001, 100, 101} A2 = {000, 111}.

More general example (transversal logarithmic signatures) : Given achain

1 = H0 < H1 < · · · < Hs = G

of subgroups, set Ai to be a complete set of coset representatives forHi in Hi−1.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 11 / 20

Page 45: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

A logarithmic signature or factorisation is an (ordered) collection ofsets

A1,A2, . . . ,As ⊆ G

such that for all h ∈ Gh = a1a2 · · · as

in exactly one way, where ai ∈ Ai .

Example in G = Z32:

A1 = {000, 001, 100, 101} A2 = {000, 111}.

More general example (transversal logarithmic signatures) : Given achain

1 = H0 < H1 < · · · < Hs = G

of subgroups, set Ai to be a complete set of coset representatives forHi in Hi−1.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 11 / 20

Page 46: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

A logarithmic signature or factorisation is an (ordered) collection ofsets

A1,A2, . . . ,As ⊆ G

such that for all h ∈ Gh = a1a2 · · · as

in exactly one way, where ai ∈ Ai .

Example in G = Z32:

A1 = {000, 001, 100, 101} A2 = {000, 111}.

More general example (transversal logarithmic signatures) : Given achain

1 = H0 < H1 < · · · < Hs = G

of subgroups, set Ai to be a complete set of coset representatives forHi in Hi−1.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 11 / 20

Page 47: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

Let A1,A2, . . . ,As be a logarithmic signature, with |Ai | = ri . Then

|G | = r1r2 · · · rs .

The logarithmic signature induces a bijective function

α : Zr1 × Zr2 × · · · × Zrs → G

defined byα(k1, k2, . . . , kr ) = a1a2 . . . ar

where ai is the ki th element of Ai .

If α is easy to invert, we say that α is tame.

If we have a cover, the function α makes sense and is onto, but is notnecessarily injective.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 12 / 20

Page 48: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

Let A1,A2, . . . ,As be a logarithmic signature, with |Ai | = ri . Then

|G | = r1r2 · · · rs .

The logarithmic signature induces a bijective function

α : Zr1 × Zr2 × · · · × Zrs → G

defined byα(k1, k2, . . . , kr ) = a1a2 . . . ar

where ai is the ki th element of Ai .

If α is easy to invert, we say that α is tame.

If we have a cover, the function α makes sense and is onto, but is notnecessarily injective.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 12 / 20

Page 49: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

Let A1,A2, . . . ,As be a logarithmic signature, with |Ai | = ri . Then

|G | = r1r2 · · · rs .

The logarithmic signature induces a bijective function

α : Zr1 × Zr2 × · · · × Zrs → G

defined byα(k1, k2, . . . , kr ) = a1a2 . . . ar

where ai is the ki th element of Ai .

If α is easy to invert, we say that α is tame.

If we have a cover, the function α makes sense and is onto, but is notnecessarily injective.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 12 / 20

Page 50: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Logarithmic signatures

Let A1,A2, . . . ,As be a logarithmic signature, with |Ai | = ri . Then

|G | = r1r2 · · · rs .

The logarithmic signature induces a bijective function

α : Zr1 × Zr2 × · · · × Zrs → G

defined byα(k1, k2, . . . , kr ) = a1a2 . . . ar

where ai is the ki th element of Ai .

If α is easy to invert, we say that α is tame.

If we have a cover, the function α makes sense and is onto, but is notnecessarily injective.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 12 / 20

Page 51: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 52: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 53: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 54: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.

Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 55: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 56: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 57: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

(Simplified) MST3

Let G be a group with centre Z . Let random A1,A2, . . . ,As ⊆ Ghave

∏|Ai | = |Z |. These are public.

Let B1,B2, . . . ,Bs be a secret tame logarithmic signature for Z with|Bi | = |Ai |. Let t ∈ G be secret.

Idea: use t−1Ai t to disguise Bi .

If Ai = {ai ,1, . . . , ai ,ri} and Bi = {bi ,1, . . . , bi ,ri} defineGi = Bi · (t−1Ai t) = {bi ,j t

−1ai ,j t}.Public key: the sets Gi . Secret key: t and the sets Bi .

Encrypt x as the pair (α(x), γ(x)).

To Decrypt (y1, y2): use y2 = β(x) t−1α(x)t.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 13 / 20

Page 58: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Platform groups and practicalities

Lempken, Magliveras, van Trung, Wei suggest G should be a Suzuki2-group. Let q be a power of 2, and θ ∈ Aut(Fq). Then:

G =

1 0 0

a 1 0b aθ 1

where a, b ∈ Fq

.

Z consists of the matrices with a = 0.

G/Z is abelian of order q, and Z also has order q.

Unanswered question: How to generate B1,B2, . . . ,Bs .

Simon R. Blackburn (RHUL) Group Theory and Cryptography 14 / 20

Page 59: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Platform groups and practicalities

Lempken, Magliveras, van Trung, Wei suggest G should be a Suzuki2-group. Let q be a power of 2, and θ ∈ Aut(Fq). Then:

G =

1 0 0

a 1 0b aθ 1

where a, b ∈ Fq

.

Z consists of the matrices with a = 0.

G/Z is abelian of order q, and Z also has order q.

Unanswered question: How to generate B1,B2, . . . ,Bs .

Simon R. Blackburn (RHUL) Group Theory and Cryptography 14 / 20

Page 60: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Platform groups and practicalities

Lempken, Magliveras, van Trung, Wei suggest G should be a Suzuki2-group. Let q be a power of 2, and θ ∈ Aut(Fq). Then:

G =

1 0 0

a 1 0b aθ 1

where a, b ∈ Fq

.

Z consists of the matrices with a = 0.

G/Z is abelian of order q, and Z also has order q.

Unanswered question: How to generate B1,B2, . . . ,Bs .

Simon R. Blackburn (RHUL) Group Theory and Cryptography 14 / 20

Page 61: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Platform groups and practicalities

Lempken, Magliveras, van Trung, Wei suggest G should be a Suzuki2-group. Let q be a power of 2, and θ ∈ Aut(Fq). Then:

G =

1 0 0

a 1 0b aθ 1

where a, b ∈ Fq

.

Z consists of the matrices with a = 0.

G/Z is abelian of order q, and Z also has order q.

Unanswered question: How to generate B1,B2, . . . ,Bs .

Simon R. Blackburn (RHUL) Group Theory and Cryptography 14 / 20

Page 62: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

A simple attack

Lempken et al. gave several O(q2) attacks. Magliveras, Svaba,van Trung and Zajac give the following attack.

We are given covers Ai and Gi , where

Gi = Bi · (t−1Ai t).

The decryption process uses t and Bi .

The attack is: Guess t. Find Bi from the equation above.

There are |G | = q2 possibilities for t. But we only need to check|G/Z | = q possibilities: it’s only t modulo Z that matters.

This is an exponential attack. It works for any group G .

More practical attacks use knowledge of how the Bi are generated.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 15 / 20

Page 63: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

A simple attack

Lempken et al. gave several O(q2) attacks. Magliveras, Svaba,van Trung and Zajac give the following attack.

We are given covers Ai and Gi , where

Gi = Bi · (t−1Ai t).

The decryption process uses t and Bi .

The attack is: Guess t. Find Bi from the equation above.

There are |G | = q2 possibilities for t. But we only need to check|G/Z | = q possibilities: it’s only t modulo Z that matters.

This is an exponential attack. It works for any group G .

More practical attacks use knowledge of how the Bi are generated.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 15 / 20

Page 64: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

A simple attack

Lempken et al. gave several O(q2) attacks. Magliveras, Svaba,van Trung and Zajac give the following attack.

We are given covers Ai and Gi , where

Gi = Bi · (t−1Ai t).

The decryption process uses t and Bi .

The attack is: Guess t. Find Bi from the equation above.

There are |G | = q2 possibilities for t. But we only need to check|G/Z | = q possibilities: it’s only t modulo Z that matters.

This is an exponential attack. It works for any group G .

More practical attacks use knowledge of how the Bi are generated.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 15 / 20

Page 65: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

A simple attack

Lempken et al. gave several O(q2) attacks. Magliveras, Svaba,van Trung and Zajac give the following attack.

We are given covers Ai and Gi , where

Gi = Bi · (t−1Ai t).

The decryption process uses t and Bi .

The attack is: Guess t. Find Bi from the equation above.

There are |G | = q2 possibilities for t. But we only need to check|G/Z | = q possibilities: it’s only t modulo Z that matters.

This is an exponential attack. It works for any group G .

More practical attacks use knowledge of how the Bi are generated.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 15 / 20

Page 66: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

A simple attack

Lempken et al. gave several O(q2) attacks. Magliveras, Svaba,van Trung and Zajac give the following attack.

We are given covers Ai and Gi , where

Gi = Bi · (t−1Ai t).

The decryption process uses t and Bi .

The attack is: Guess t. Find Bi from the equation above.

There are |G | = q2 possibilities for t. But we only need to check|G/Z | = q possibilities: it’s only t modulo Z that matters.

This is an exponential attack. It works for any group G .

More practical attacks use knowledge of how the Bi are generated.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 15 / 20

Page 67: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

A simple attack

Lempken et al. gave several O(q2) attacks. Magliveras, Svaba,van Trung and Zajac give the following attack.

We are given covers Ai and Gi , where

Gi = Bi · (t−1Ai t).

The decryption process uses t and Bi .

The attack is: Guess t. Find Bi from the equation above.

There are |G | = q2 possibilities for t. But we only need to check|G/Z | = q possibilities: it’s only t modulo Z that matters.

This is an exponential attack. It works for any group G .

More practical attacks use knowledge of how the Bi are generated.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 15 / 20

Page 68: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Generating a logarithmic signature

We want to generate a tame logarithmic signature for

Z = Z2 × Z2 × · · · × Z2.

Amalgamated Transversal Logarithmic Signatures (ATLS)

Start with a chain 1 = H0 < H1 < H2 < · · · < Hk = Z of subgroups.

Set Xi to be a set of coset representatives for Hi in Hi−1.

Do some of the following operations:I Shift: replace Xi by Xiz for some z ∈ Z .I Permute: swap Xi and Xj ; permute the elements in Xi .I Amalgamate: replace Xi and Xj by

XiXj = {xixj | xi ∈ Xi and xj ∈ Xj}.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 16 / 20

Page 69: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Generating a logarithmic signature

We want to generate a tame logarithmic signature for

Z = Z2 × Z2 × · · · × Z2.

Amalgamated Transversal Logarithmic Signatures (ATLS)

Start with a chain 1 = H0 < H1 < H2 < · · · < Hk = Z of subgroups.

Set Xi to be a set of coset representatives for Hi in Hi−1.

Do some of the following operations:I Shift: replace Xi by Xiz for some z ∈ Z .I Permute: swap Xi and Xj ; permute the elements in Xi .I Amalgamate: replace Xi and Xj by

XiXj = {xixj | xi ∈ Xi and xj ∈ Xj}.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 16 / 20

Page 70: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Generating a logarithmic signature

We want to generate a tame logarithmic signature for

Z = Z2 × Z2 × · · · × Z2.

Amalgamated Transversal Logarithmic Signatures (ATLS)

Start with a chain 1 = H0 < H1 < H2 < · · · < Hk = Z of subgroups.

Set Xi to be a set of coset representatives for Hi in Hi−1.

Do some of the following operations:I Shift: replace Xi by Xiz for some z ∈ Z .I Permute: swap Xi and Xj ; permute the elements in Xi .I Amalgamate: replace Xi and Xj by

XiXj = {xixj | xi ∈ Xi and xj ∈ Xj}.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 16 / 20

Page 71: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Generating a logarithmic signature

We want to generate a tame logarithmic signature for

Z = Z2 × Z2 × · · · × Z2.

Amalgamated Transversal Logarithmic Signatures (ATLS)

Start with a chain 1 = H0 < H1 < H2 < · · · < Hk = Z of subgroups.

Set Xi to be a set of coset representatives for Hi in Hi−1.

Do some of the following operations:I Shift: replace Xi by Xiz for some z ∈ Z .I Permute: swap Xi and Xj ; permute the elements in Xi .I Amalgamate: replace Xi and Xj by

XiXj = {xixj | xi ∈ Xi and xj ∈ Xj}.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 16 / 20

Page 72: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Generating a logarithmic signature

We want to generate a tame logarithmic signature for

Z = Z2 × Z2 × · · · × Z2.

Amalgamated Transversal Logarithmic Signatures (ATLS)

Start with a chain 1 = H0 < H1 < H2 < · · · < Hk = Z of subgroups.

Set Xi to be a set of coset representatives for Hi in Hi−1.

Do some of the following operations:I Shift: replace Xi by Xiz for some z ∈ Z .I Permute: swap Xi and Xj ; permute the elements in Xi .I Amalgamate: replace Xi and Xj by

XiXj = {xixj | xi ∈ Xi and xj ∈ Xj}.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 16 / 20

Page 73: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

The security of ATLS-MST3

Suppose we generate an ATLS B1,B2, . . . ,Bs to use in MST3.

Without loss of generality, we can assume the ATLS is normalised:1 ∈ Bi for all i .

For a normalised ATLS, there exists b = bj ,` ∈ Bj (for some j) suchthat Bjb = Bj .

Recall that we are given Gi , Ai and want to find Bi , t so that

Gi = Bi · (t−1Ai t).

If we guess j and ` (few choices) the condition Bjb = Bj usuallyimposes very strong restrictions on t (so exhaustive search is possible).

This attack works for practical parameter sizes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 17 / 20

Page 74: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

The security of ATLS-MST3

Suppose we generate an ATLS B1,B2, . . . ,Bs to use in MST3.

Without loss of generality, we can assume the ATLS is normalised:1 ∈ Bi for all i .

For a normalised ATLS, there exists b = bj ,` ∈ Bj (for some j) suchthat Bjb = Bj .

Recall that we are given Gi , Ai and want to find Bi , t so that

Gi = Bi · (t−1Ai t).

If we guess j and ` (few choices) the condition Bjb = Bj usuallyimposes very strong restrictions on t (so exhaustive search is possible).

This attack works for practical parameter sizes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 17 / 20

Page 75: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

The security of ATLS-MST3

Suppose we generate an ATLS B1,B2, . . . ,Bs to use in MST3.

Without loss of generality, we can assume the ATLS is normalised:1 ∈ Bi for all i .

For a normalised ATLS, there exists b = bj ,` ∈ Bj (for some j) suchthat Bjb = Bj .

Recall that we are given Gi , Ai and want to find Bi , t so that

Gi = Bi · (t−1Ai t).

If we guess j and ` (few choices) the condition Bjb = Bj usuallyimposes very strong restrictions on t (so exhaustive search is possible).

This attack works for practical parameter sizes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 17 / 20

Page 76: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

The security of ATLS-MST3

Suppose we generate an ATLS B1,B2, . . . ,Bs to use in MST3.

Without loss of generality, we can assume the ATLS is normalised:1 ∈ Bi for all i .

For a normalised ATLS, there exists b = bj ,` ∈ Bj (for some j) suchthat Bjb = Bj .

Recall that we are given Gi , Ai and want to find Bi , t so that

Gi = Bi · (t−1Ai t).

If we guess j and ` (few choices) the condition Bjb = Bj usuallyimposes very strong restrictions on t (so exhaustive search is possible).

This attack works for practical parameter sizes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 17 / 20

Page 77: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

The security of ATLS-MST3

Suppose we generate an ATLS B1,B2, . . . ,Bs to use in MST3.

Without loss of generality, we can assume the ATLS is normalised:1 ∈ Bi for all i .

For a normalised ATLS, there exists b = bj ,` ∈ Bj (for some j) suchthat Bjb = Bj .

Recall that we are given Gi , Ai and want to find Bi , t so that

Gi = Bi · (t−1Ai t).

If we guess j and ` (few choices) the condition Bjb = Bj usuallyimposes very strong restrictions on t (so exhaustive search is possible).

This attack works for practical parameter sizes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 17 / 20

Page 78: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

The security of ATLS-MST3

Suppose we generate an ATLS B1,B2, . . . ,Bs to use in MST3.

Without loss of generality, we can assume the ATLS is normalised:1 ∈ Bi for all i .

For a normalised ATLS, there exists b = bj ,` ∈ Bj (for some j) suchthat Bjb = Bj .

Recall that we are given Gi , Ai and want to find Bi , t so that

Gi = Bi · (t−1Ai t).

If we guess j and ` (few choices) the condition Bjb = Bj usuallyimposes very strong restrictions on t (so exhaustive search is possible).

This attack works for practical parameter sizes.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 17 / 20

Page 79: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Can the security of MST3 be saved?

Can you avoid this attack by generating β in some other way?

β cannot be periodic (cannot have bBi = Bi for some b ∈ Bi ).

β should have full rank (must have 〈⋃

j 6=i Bj〉 = G for all i).

What can be said about logarithmic signatures of finite elementaryabelian 2-groups?

Related to perfect codes: Cohen, Litsyn, Vardy, Zemor 1996.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 18 / 20

Page 80: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Can the security of MST3 be saved?

Can you avoid this attack by generating β in some other way?

β cannot be periodic (cannot have bBi = Bi for some b ∈ Bi ).

β should have full rank (must have 〈⋃

j 6=i Bj〉 = G for all i).

What can be said about logarithmic signatures of finite elementaryabelian 2-groups?

Related to perfect codes: Cohen, Litsyn, Vardy, Zemor 1996.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 18 / 20

Page 81: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Can the security of MST3 be saved?

Can you avoid this attack by generating β in some other way?

β cannot be periodic (cannot have bBi = Bi for some b ∈ Bi ).

β should have full rank (must have 〈⋃

j 6=i Bj〉 = G for all i).

What can be said about logarithmic signatures of finite elementaryabelian 2-groups?

Related to perfect codes: Cohen, Litsyn, Vardy, Zemor 1996.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 18 / 20

Page 82: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Can the security of MST3 be saved?

Can you avoid this attack by generating β in some other way?

β cannot be periodic (cannot have bBi = Bi for some b ∈ Bi ).

β should have full rank (must have 〈⋃

j 6=i Bj〉 = G for all i).

What can be said about logarithmic signatures of finite elementaryabelian 2-groups?

Related to perfect codes: Cohen, Litsyn, Vardy, Zemor 1996.

Simon R. Blackburn (RHUL) Group Theory and Cryptography 18 / 20

Page 83: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Summing up

We’ve reviewed some of the cryptographic primitives based on groups(finite or infinite).

We’ve sketched some problems with the security of MST3.

Logarithmic signatures have applications to tiling problems; to perfectGray codes and to other combinatorial problems in computer science.

Can MST3, or any other group-theoretic cryptosystem, be made bothsecure and practical?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 19 / 20

Page 84: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Summing up

We’ve reviewed some of the cryptographic primitives based on groups(finite or infinite).

We’ve sketched some problems with the security of MST3.

Logarithmic signatures have applications to tiling problems; to perfectGray codes and to other combinatorial problems in computer science.

Can MST3, or any other group-theoretic cryptosystem, be made bothsecure and practical?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 19 / 20

Page 85: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Summing up

We’ve reviewed some of the cryptographic primitives based on groups(finite or infinite).

We’ve sketched some problems with the security of MST3.

Logarithmic signatures have applications to tiling problems; to perfectGray codes and to other combinatorial problems in computer science.

Can MST3, or any other group-theoretic cryptosystem, be made bothsecure and practical?

Simon R. Blackburn (RHUL) Group Theory and Cryptography 19 / 20

Page 86: Group Theory and Cryptographypersonal.rhul.ac.uk/uhah/058/talks/bedlewo2010.pdfGroup Theory and Cryptography Simon R. Blackburn Joint work withCarlos Cid,Ciaran Mullan 1 Standard logo

Some Links

This talk will appear soon on my home page:

http://www.ma.rhul.ac.uk/sblackburn

S.R. Blackburn, C. Cid, C. Mullan, ‘Group theory in cryptography’ (Proc.Groups St Andrews at Bath 2009, to appear) is available at:

http://arxiv.org/abs/0906.5545

The paper ‘Cryptanalysis of the MST3 public key cryptosystem’ (J. MathCryptology, 2010) is also available at:

http://eprint.iacr.org/2009/248

Simon R. Blackburn (RHUL) Group Theory and Cryptography 20 / 20