Novel Protocols in Group-based Cryptography

Authors

  • Serge Horbach Radboud University Nijmegen

Abstract

In this research we propose new protocols in group-based cryptography contributing to the research of finding novel cryptographic systems that are secure against quantum computers. The protocols we introduce either employ different one-way functions or different groups then the currently available protocols in group-based cryptography. Thereby, we avoid the successful attacks that threaten the contemporary existing group-based cryptosystems.

Author Biography

Serge Horbach, Radboud University Nijmegen

IMAPP

References

Anshel I., Anshel M., Goldfeld D., ‘An Algebraic Method for Public Key Cryptography’. Math.Res.Lett, vol. 6, Springer Verlag, pp 287-291, 1999.

Bosma W. and Cannon J., ‘MAGMA Handbook’, Sydney, 1993.

Horbach S., ‘Group-based Cryptography’, Bachelor Thesis, Radboud University, Nijmegen, 2014.

Ko K., Lee J. et al.: ‘New Public-key Cryptography using BraidGroups’. Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, Springer, vol. 1880, pp 166 - 183, 2000.

Lenstra A. and Verheul E., ‘Selecting Cryptographic Key Sizes’. Public Key cryptography, Lecture Notes in Computer Science, vol. 1751, Springer-Verlag, pp 446 - 465, 2000.

Luks E.M., ‘Permutation Groups and Polynomial-Time Computation’. DIMACS Series in Discrete Mathematics and Theoretical Computer Science, vol. 11, pp 139 - 175, 1993.

Myasnikov A., Shpilrain V., Ushakov A., ‘Group-based cryptography’, Advanced Courses in Mathematics, CRM Barcelona, 2007.

Overbeck R. and Sendrier N., ‘Code-based cryptography’. Post-Quantum Cryptography 2009, Springer, pp 95 - 145, 2009.

Sendrier N. and Simos D.E., ‘The hardness of code equivalence over Fq and its applications to Code-Based cryptography’. Post-Quantum Cryptography, Lecture Notes in computer Science, vol. 7932, Springer-Verlag, pp. 203 - 216, 2013

Downloads

Published

2015-11-20

Issue

Section

Economics & Social Sciences