15 research outputs found
Finding roots of polynomials over finite fields
We propose an improved algorithm for finding roots of polynomials over finite
fields. This makes possible significant speedup of the decoding process of
Bose-Chaudhuri-Hocquenghem, Reed-Solomon, and some other error-correcting
codes.Comment: 6 pages. IEEE Transactions on Communication
On non-abelian homomorphic public-key cryptosystems
An important problem of modern cryptography concerns secret public-key
computations in algebraic structures. We construct homomorphic cryptosystems
being (secret) epimorphisms f:G --> H, where G, H are (publically known) groups
and H is finite. A letter of a message to be encrypted is an element h element
of H, while its encryption g element of G is such that f(g)=h. A homomorphic
cryptosystem allows one to perform computations (operating in a group G) with
encrypted information (without knowing the original message over H).
In this paper certain homomorphic cryptosystems are constructed for the first
time for non-abelian groups H (earlier, homomorphic cryptosystems were known
only in the Abelian case). In fact, we present such a system for any solvable
(fixed) group H.Comment: 15 pages, LaTe
Homomorphic public-key cryptosystems and encrypting boolean circuits
In this paper homomorphic cryptosystems are designed for the first time over
any finite group. Applying Barrington's construction we produce for any boolean
circuit of the logarithmic depth its encrypted simulation of a polynomial size
over an appropriate finitely generated group
New Decoding of Reed-Solomon Codes Based on FFT and Modular Approach
Decoding algorithms for Reed--Solomon (RS) codes are of great interest for
both practical and theoretical reasons. In this paper, an efficient algorithm,
called the modular approach (MA), is devised for solving the Welch--Berlekamp
(WB) key equation. By taking the MA as the key equation solver, we propose a
new decoding algorithm for systematic RS codes. For RS codes, where
is the code length and is the code dimension, the proposed decoding
algorithm has both the best asymptotic computational complexity and the smallest constant factor achieved to date. By
comparing the number of field operations required, we show that when decoding
practical RS codes, the new algorithm is significantly superior to the existing
methods in terms of computational complexity. When decoding the
RS code defined over , the new algorithm is 10 times
faster than a conventional syndrome-based method. Furthermore, the new
algorithm has a regular architecture and is thus suitable for hardware
implementation
Homomorphic public-key cryptosystems and encrypting boolean circuits
International audienceGiven an arbitrary finite nontrivial group, we describe a probabilistic public-key cryptosystem in which the decryption function is chosen to be a suitable epimorphism from the free product of finite Abelian groups onto this finite group. It extends the quadratic residue cryptosystem (based on a homomorphism onto the group of two elements) due to Rabin – Goldwasser – Micali. The security of the cryptosystem relies on the intractability of factoring integers. As an immediate corollary of the main construction, we obtain a more direct proof (based on the Barrington technique) of Sander-Young-Yung result on an encrypted simulation of a boolean circuit of the logarithmic depth
Fast and Secure Root Finding for Code-based Cryptosystems
In this work we analyze five previously published respectively trivial
approaches and two new hybrid variants for the task of finding the roots of the error locator polynomial
during the decryption operation of code-based encryption schemes. We compare
the performance of these algorithms and show that optimizations concerning
finite field element representations
play a key role for the speed of software implementations.
Furthermore, we point out a number of timing attack vulnerabilities that
can arise in root-finding algorithms, some aimed at recovering the message,
others at the secret support. We give experimental results of software
implementations showing that
manifestations of these vulnerabilities are present in straightforward
implementations of most of the root-finding variants presented in this
work.
As a result, we find that one of the variants provides security with respect to
all vulnerabilities as well as competitive computation time for code parameters that minimize the public key size
Number Field Sieve with Provable Complexity
In this thesis we give an in-depth introduction to the General Number Field
Sieve, as it was used by Buhler, Lenstra, and Pomerance, before looking at one
of the modern developments of this algorithm: A randomized version with
provable complexity. This version was posited in 2017 by Lee and Venkatesan and
will be preceded by ample material from both algebraic and analytic number
theory, Galois theory, and probability theory.Comment: MSc Thesis, 113 pages, 1 tabl
Signing with Codes
Code-based cryptography is an area of classical cryptography in which cryptographic primitives rely on hard problems and trapdoor functions related to linear error-correcting codes. Since its inception in 1978, the area has produced the McEliece and the Niederreiter cryptosystems, multiple digital signature schemes, identification schemes and code-based hash functions. All of these are believed to be resistant to attacks by quantum computers. Hence, code-based cryptography represents a post-quantum alternative to the widespread number-theoretic systems.
This thesis summarizes recent developments in the field of code-based cryptography, with a particular emphasis on code-based signature schemes. After a brief introduction and analysis of the McEliece and the Niederreiter cryptosystems, we discuss the currently unresolved issue of constructing a practical, yet provably secure signature scheme. A detailed analysis is provided for the Courtois, Finiasz and Sendrier signature scheme, along with the mCFS and parallel CFS variations. Finally, we discuss a recent proposal by Preetha et al. that attempts to solve the issue of provable security, currently failing in the CFS scheme case, by randomizing the public key construct. We conclude that, while the proposal is not yet practical, it represents an important advancement in the search for an ideal code-based signature scheme