fbpx
Wikipedia

CEILIDH

CEILIDH is a public key cryptosystem based on the discrete logarithm problem in algebraic torus. This idea was first introduced by Alice Silverberg and Karl Rubin in 2003; Silverberg named CEILIDH after her cat.[1][2] The main advantage of the system is the reduced size of the keys for the same security over basic schemes.[which?]

Algorithms edit

Parameters edit

  • Let   be a prime power.
  • An integer   is chosen such that :
    • The torus   has an explicit rational parametrization.
    •   is divisible by a big prime   where   is the   Cyclotomic polynomial.
  • Let   where   is the Euler function.
  • Let   a birational map and its inverse  .
  • Choose   of order   and let  .

Key agreement scheme edit

This Scheme is based on the Diffie-Hellman key agreement.

  • Alice chooses a random number  .
  • She computes   and sends it to Bob.
  • Bob chooses a random number  .
  • He computes   and sends it to Alice.
  • Alice computes  
  • Bob computes  

  is the identity, thus we have :   which is the shared secret of Alice and Bob.

Encryption scheme edit

This scheme is based on the ElGamal encryption.

  • Key Generation
    • Alice chooses a random number   as her private key.
    • The resulting public key is  .
  • Encryption
    • The message   is an element of  .
    • Bob chooses a random integer   in the range  .
    • Bob computes   and  .
    • Bob sends the ciphertext   to Alice.
  • Decryption
    • Alice computes  .

Security edit

The CEILIDH scheme is based on the ElGamal scheme and thus has similar security properties.

If the computational Diffie-Hellman assumption holds the underlying cyclic group  , then the encryption function is one-way.[3] If the decisional Diffie-Hellman assumption (DDH) holds in  , then CEILIDH achieves semantic security.[3] Semantic security is not implied by the computational Diffie-Hellman assumption alone.[4] See decisional Diffie-Hellman assumption for a discussion of groups where the assumption is believed to hold.

CEILIDH encryption is unconditionally malleable, and therefore is not secure under chosen ciphertext attack. For example, given an encryption   of some (possibly unknown) message  , one can easily construct a valid encryption   of the message  .

References edit

  1. ^ Silverberg, Alice (November 2006). "Alice in NUMB3Rland" (PDF). Focus. Mathematical Association of America. Retrieved 12 July 2018.
  2. ^ Kirsch, Rachel (December 2010). "Cryptography: How to Keep a Secret". Mathematical Association of America. Retrieved 12 July 2018.
  3. ^ a b . CRYPTUTOR. Archived from the original on 2009-04-21. Retrieved 2009-04-21.
  4. ^ Abdalla, M.; Bellare, M.; Rogaway, P. (September 1998). "DHIES: An encryption scheme based on the Diffie-Hellman Problem (Appendix A)" (PDF).
  • Rubin, K.; Silverberg, A. (2003). "Torus-Based Cryptography". In Boneh, D. (ed.). Advances in Cryptology - CRYPTO 2003. Lecture Notes in Computer Science. Vol. 2729. Springer, Berlin, Heidelberg. pp. 349–365. doi:10.1007/978-3-540-45146-4_21. ISBN 9783540406747.

External links edit

  • Torus-Based Cryptography: the paper introducing the concept (in PDF from Silverberg's university web page).

ceilidh, this, article, about, cryptosystem, traditional, scottish, irish, social, gathering, cèilidh, public, cryptosystem, based, discrete, logarithm, problem, algebraic, torus, this, idea, first, introduced, alice, silverberg, karl, rubin, 2003, silverberg,. This article is about the cryptosystem For traditional Scottish and Irish social gathering see Ceilidh CEILIDH is a public key cryptosystem based on the discrete logarithm problem in algebraic torus This idea was first introduced by Alice Silverberg and Karl Rubin in 2003 Silverberg named CEILIDH after her cat 1 2 The main advantage of the system is the reduced size of the keys for the same security over basic schemes which Contents 1 Algorithms 1 1 Parameters 1 2 Key agreement scheme 1 3 Encryption scheme 2 Security 3 References 4 External linksAlgorithms editParameters edit Let q displaystyle q nbsp be a prime power An integer n displaystyle n nbsp is chosen such that The torus Tn displaystyle T n nbsp has an explicit rational parametrization Fn q displaystyle Phi n q nbsp is divisible by a big prime l displaystyle l nbsp where Fn displaystyle Phi n nbsp is the nth displaystyle n th nbsp Cyclotomic polynomial Let m ϕ n displaystyle m phi n nbsp where ϕ displaystyle phi nbsp is the Euler function Let r Tn Fq Fqm displaystyle rho T n mathbb F q rightarrow mathbb F q m nbsp a birational map and its inverse ps displaystyle psi nbsp Choose a Tn displaystyle alpha in T n nbsp of order l displaystyle l nbsp and let g r a displaystyle g rho alpha nbsp Key agreement scheme edit This Scheme is based on the Diffie Hellman key agreement Alice chooses a random number a modFn q displaystyle a pmod Phi n q nbsp She computes PA r ps g a Fqm displaystyle P A rho psi g a in mathbb F q m nbsp and sends it to Bob Bob chooses a random number b modFn q displaystyle b pmod Phi n q nbsp He computes PB r ps g b Fqm displaystyle P B rho psi g b in mathbb F q m nbsp and sends it to Alice Alice computes r ps PB a Fqm displaystyle rho psi P B a in mathbb F q m nbsp Bob computes r ps PA b Fqm displaystyle rho psi P A b in mathbb F q m nbsp ps r displaystyle psi circ rho nbsp is the identity thus we have r ps PB a r ps PA b r ps g ab displaystyle rho psi P B a rho psi P A b rho psi g ab nbsp which is the shared secret of Alice and Bob Encryption scheme edit This scheme is based on the ElGamal encryption Key Generation Alice chooses a random number a modFn q displaystyle a pmod Phi n q nbsp as her private key The resulting public key is PA r ps g a Fqm displaystyle P A rho psi g a in mathbb F q m nbsp Encryption The message M displaystyle M nbsp is an element of Fqm displaystyle mathbb F q m nbsp Bob chooses a random integer k displaystyle k nbsp in the range 1 k l 1 displaystyle 1 leq k leq l 1 nbsp Bob computes g r ps g k Fqm displaystyle gamma rho psi g k in mathbb F q m nbsp and d r ps M ps PA k Fqm displaystyle delta rho psi M psi P A k in mathbb F q m nbsp Bob sends the ciphertext g d displaystyle gamma delta nbsp to Alice Decryption Alice computes M r ps d ps g a displaystyle M rho psi delta psi gamma a nbsp Security editThe CEILIDH scheme is based on the ElGamal scheme and thus has similar security properties If the computational Diffie Hellman assumption holds the underlying cyclic group G displaystyle G nbsp then the encryption function is one way 3 If the decisional Diffie Hellman assumption DDH holds in G displaystyle G nbsp then CEILIDH achieves semantic security 3 Semantic security is not implied by the computational Diffie Hellman assumption alone 4 See decisional Diffie Hellman assumption for a discussion of groups where the assumption is believed to hold CEILIDH encryption is unconditionally malleable and therefore is not secure under chosen ciphertext attack For example given an encryption c1 c2 displaystyle c 1 c 2 nbsp of some possibly unknown message m displaystyle m nbsp one can easily construct a valid encryption c1 2c2 displaystyle c 1 2c 2 nbsp of the message 2m displaystyle 2m nbsp References edit Silverberg Alice November 2006 Alice in NUMB3Rland PDF Focus Mathematical Association of America Retrieved 12 July 2018 Kirsch Rachel December 2010 Cryptography How to Keep a Secret Mathematical Association of America Retrieved 12 July 2018 a b El gamal Encryption Scheme CRYPTUTOR Archived from the original on 2009 04 21 Retrieved 2009 04 21 Abdalla M Bellare M Rogaway P September 1998 DHIES An encryption scheme based on the Diffie Hellman Problem Appendix A PDF Rubin K Silverberg A 2003 Torus Based Cryptography In Boneh D ed Advances in Cryptology CRYPTO 2003 Lecture Notes in Computer Science Vol 2729 Springer Berlin Heidelberg pp 349 365 doi 10 1007 978 3 540 45146 4 21 ISBN 9783540406747 External links editTorus Based Cryptography the paper introducing the concept in PDF from Silverberg s university web page Retrieved from https en wikipedia org w index php title CEILIDH amp oldid 1187611437, wikipedia, wiki, book, books, library,

article

, read, download, free, free download, mp3, video, mp4, 3gp, jpg, jpeg, gif, png, picture, music, song, movie, book, game, games.