RUS  ENG
Full version
JOURNALS // Prikladnaya Diskretnaya Matematika // Archive

Prikl. Diskr. Mat., 2013 Number 3(21), Pages 35–51 (Mi pdm424)

This article is cited in 11 papers

Mathematical Methods of Cryptography

Cryptanalysis of some schemes applying automorphisms

V. A. Romankovab

a Omsk State University, Omsk, Russia
b Omsk State Technical University, Omsk, Russia

Abstract: Some methods are given for cryptanalysis of encryption schemes and key establishment protocols based on a group (loop) algebra or on a graded algebra with multiplicative base and proposed by Rososhek; Mihalev et. al.; Mahalanobis, etc. These cryptosystems have a common feature that all of them (except the scheme of Mihalev) use automorphisms. Also, a cryptanalysis of the key exchange protocol proposed by Megreleshvili and Djindjihadze is given. An original approach is described to find a secret message or a shared key based on usual tools of linear algebra assuming that platform can be chosen as a finite dimensional algebra, e.g., a matrix algebra over a field. The approach does not suppose to find the secret automorphism used in protocol. A theoretical foundation of this approach and a series of attacks on some cryptosystems based on different generalizations of discrete logarithm and Diffie–Hellman's ideas to noncommutative groups are described by the author earlier. Here the approach is developed by presenting its new applications in cryptanalysis of different schemes and protocols.

Keywords: cryptographic scheme, group algebra, loop algebra, matrix algebra, graded algebra, discrete logarithm, generalized discrete logarithm, Diffie–Hellman scheme, El Gamal protocol, automorphism.

UDC: 512.5+00326.09



© Steklov Math. Inst. of RAS, 2024