METHOD OF ENCRYPTION BASED ON THE FUNCTIONAL FIELD OF THE HERMITIAN GROUP ENHANCED BY HOMOMORPHIC TRANSFORMATION

Authors

DOI:

https://doi.org/10.18372/2225-5036.29.18071

Keywords:

MST3 cryptosystem, Hermitian group, logarithmic signatures, homomorphic transformation

Abstract

The challenge of implementing a commercial model for a powerful quantum computer is poised to compromise existing cryptographic primitives within asymmetric cryptography. Shor's quantum algorithm, capable of solving integer factorization and discrete logarithms, threatens the security of cryptosystems like RSA and ECC. Globally, national and international competitions are underway to develop new post-quantum standards for asymmetric encryption systems, digital signature schemes, and key distribution methods. A promising direction in developing cryptosystems resistant to quantum attacks involves utilizing problems that are highly complex to solve in certain groups. This article explores the method of directional encryption, enhanced by homomorphic transformation, within a cryptographic system based on an unsolved word problem. This system employs a special type of factorization known as logarithmic signatures within the Hermitian group. We substantiate that this implementation offers enhanced secrecy and demonstrate the feasibility of creating a secure cryptosystem using group computations in a small finite field. Furthermore, the application of homomorphic encryption to random coverages in a logarithmic signature provides protection against known attacks targeting logarithmic signature implementations.

References

Kotukh Y., Severinov E., Vlasov O., Tenytska A., Zarudna E. Some results of development of crypto-graphic transformations schemes using non-abelian gro-ups // Радіотехніка. 2021. Вип. 204. С. 66-72.

Котух Є., Сєвєрінов О., Власов А. та ін. Методи побудови та властивості логарифмічних підписів // Радіотехніка. 2021. Вип. 205. С. 94-99.

Kotukh Y., Khalimov G. Hard Problems for Non-abelian Group Cryptography, 2021 // Fifth Inter-national Scientific and Technical Conference "Computer and Information systems and technologies".

Халімов Г., Котух Є., Сергійчук Ю., Марухненко О. Аналіз складності реалізацій криптосистеми на групі Сузукі // Радіотехніка. 2018. Вип. 193. C. 75- 81.

Котух Є., Охріменко Т., Дяченко О., Ротаньо-ва Н., Козіна Л., Зеленський Д. Криптоаналіз систем на основі проблеми слова з використанням логарифмічних підписів // Радіотехніка. 2021. Вип. 206. С. 106-114.

Kotukh Y., Khalimov G. Towards practical cryptoanalysis of systems based on word problems and logarithmic signatures // Proceedings of II International Conference Information security: problems and prospects, 25 Nov 2022, Baku, Azerbaijan, pp. 55-58.

Magliveras S. New approaches to designing public key cryptosystems using one-way functions and trap-doors in finite groups / S. Magliveras, D. Stinson, T. van Trung // Journal of Cryptology. 2002. Vol. 15. pp. 285-297.

Lempken W. A public key cryptosystem based on non-abelian finite groups / W. Lempken, T. Van Trung, S.S. Magliveras, W. Wei // Journal of Cryptolo-gy. 2009. Vol. 22 (1). pp. 62-74.

Khalimov G., Kotukh Y. et al. Towards advance encryption based on a Generalized Suzuki 2-groups // 2021 International Conference on Electrical, Computer, Communications and Mechatronics Engi-neering (ICECCME). Mauritius, 2021, pp. 1-6.

Khalimov G., Kotukh Y., Khalimova S. MST3 Cryptosystem Based on a Generalized Suzuki 2-Groups [Electronic resource]. Access mode: http://ceur-ws.org/ Vol-2711/paper1.pdf.

Khalimov G., Kotukh Y., Didmanidze I., Sievie¬rinov O., Khalimova S. and Vlasov A. Towards three-parameter group encryption scheme for MST3 cryptosystem improvement // 2021 Fifth World Confer-ence on Smart Trends in Systems Security and Sustaina-bility (WorldS4), London, United Kingdom, 2021, pp. 204-211.

Khalimov G., Kotukh Y., Didmanidze I., Khalimova S. 2021. Encryption scheme based on small Ree groups // Proceedings of the 2021 7th International Conference on Computer Technology Appli-cations (ICCTA '21). ACM, New York, NY, USA. pp. 33-37.

Khalimov G., Kotukh Y., Shonia O., Didman-idze I., Sievierinov O., Khalimova S. Encryption Scheme Based on the Automorphism Group of the Suzuki Func-tion Field // 2020 IEEE PIC S&T, Kharkiv, Ukraine, 2020, pp. 383-387.

Khalimov G., Kotukh Y., Khalimova S. En-cryption scheme based on the extension of automorphism group of the Hermitian function field // Book of Abstract 20th Central European Conference on Cryptology. 2020. pp. 30-32.

Khalimov G., Kotukh Y. et al. (2022). Encryp-tion Scheme Based on the Generalized Suzuki 2-groups and Homomorphic Encryption // Chang SY., Bathen L., Di Troia F., Austin T.H., Nelson A.J. (eds). Silicon Valley Cybersecurity Conference. SVCC 2021. Communications in Computer and Information Science, vol 1536. Springer, Cham.

Khalimov G., Sievierinov O., Khalimova S., Kotukh Y., Chang S.-Y. and Balytskyi Y. Encryption Based on the Group of the Hermitian Function Field and Homomorphic Encryption // 2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T). Kharkiv, Ukraine, 2021, pp. 465- 469.

Kotukh Y., Khalimov G., Korobchinskyi М. Construction of a three-parameter encryption scheme on Hermitian groups in the MST3 cryptosystem // Radio-tekhnika. 2023. pp. 49-55.

Kotukh Y., Khalimov G., Korobcninskiy M. Method of Security Improvement for MST2 Cryptosystem Based on Automorphism Group of Ree Function Field// 2023 Theoretical and applied cybersecurity, vol.5, no. 2, pp. 31-39.

Khalimov G., Kotukh Y., Khalimova S. Im-proved encryption scheme based on the automorphism group of the Ree function field field // 2021 IEEE Inter-national IOT, Electronics and Mechatronics Conference (IEMTRONICS), IEEE Xplore. 2021

Published

2023-12-25