3 research outputs found

    Isogeny-based post-quantum key exchange protocols

    Get PDF
    The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves. In order to do so, we first introduce the reader to cryptography focusing on key agreement protocols and motivate the rise of post-quantum cryptography as a necessity with the existence of the model of quantum computation. We review some of the known attacks on the SIDH and finally study some algorithmic aspects to understand how the protocol can be implemented

    Extensions of transversal matroids

    Get PDF
    En aquest treball s'introdueixen les principals nocions de teoria de matroides, matroides transversals i extensions d'un sol element. El nostre primer objectiu és estudiar quines extensions d'una matroide transversal són també transversals. En particular, centrem el nostre estudi en la família de matroides uniformes. El conjunt d'extensions d'una matroide és un reticle sota l'anomenat weak order. Intentem respondre a la pregunta de si el conjunt d'extensions transversals d'una matroide uniforme és també un reticle o no. També dissenyem un algoritme per catalogar i contar matroides transversals fins a una certa mida del ground set. Per fer-ho, les construim a partir de la més petita, a base de iterativament extendre presentacions minimals, fent servir les eines que hem desenvolupat anteriorment. En vista que l'estratègia no troba realment totes les matroides transversals, també estudiem com són les matroides que no es poden construir amb aquesta estratègia i quines propietats satisfan.En este trabajo introducimos las nociones básicas de teoría de matroides, matroides transversales y extensiones de un solo elemento. Nuestro primer objetivo es estudiar las extensiones de matroides transversales que también son transversales. En particular, centramos nuestro estudio en la familia de las matroides uniformes. El conjunto de extensiones de una matroide es un retículo bajo el llamado weak order. Intentamos responder a la pregunta de si el conjunto de extensiones transversales de un matroide uniforme es también un retículo o no. También diseñamos un algoritmo que cataloga y cuenta matroides transversales hasta un tamaño fijo del ground set. Para ello, las construimos desde cero extendiendo iterativamente presentaciones minimales utilizando las herramientas que hemos visto anteriormente. Dado que la estrategia no cuenta realmente todas las matroides transversales, estudiamos también qué matroides no son alcanzables utilizando esta estrategia y qué propiedades satisfacen.In this work we introduce the basic notions of matroid theory, transversal matroids and single-element extensions. Our first objective is to study which extensions of a given transversal matroid are also transversal. In particular, we focus our study on the family of uniform matroids. The set of single-element extensions of a matroid is a lattice under the so-called weak order. We try to answer the question of whether the set of transversal extensions of a uniform matroid is also a lattice or not. We also design an algorithm that catalogs and counts transversal matroids up to a fixed size of the ground set. To do so, we build them from scratch by iteratively extending minimal presentations using the tools that we have previously seen. In view that the strategy does not actually count all transversal matroids, we also study which matroids are not reachable using this strategy and what properties do they satisfy

    Isogeny-based post-quantum key exchange protocols

    No full text
    The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves. In order to do so, we first introduce the reader to cryptography focusing on key agreement protocols and motivate the rise of post-quantum cryptography as a necessity with the existence of the model of quantum computation. We review some of the known attacks on the SIDH and finally study some algorithmic aspects to understand how the protocol can be implemented
    corecore