+ All Categories
Home > Documents > On Polycyclic Group Based Cryptography - UniTrento · Background Background...

On Polycyclic Group Based Cryptography - UniTrento · Background Background...

Date post: 10-Aug-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
95
On Polycyclic Group–Based Cryptography Carmine Monetta Università degli Studi di Salerno joint work (in progress) with Antonio Tortora Workshop BunnyTN 7 November 16, 2016 On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016
Transcript
Page 1: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

On Polycyclic Group–Based Cryptography

Carmine Monetta

Università degli Studi di Salerno

joint work (in progress)with Antonio Tortora

Workshop BunnyTN 7

November 16, 2016On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 2: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Background

Background

In cryptography, one of the most studied problems is how to share asecret key over an insecure channel.

Key exchange methods are usually based on one-way functions, thatis functions which are easy to compute but whose inverses are difficultto determine.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 3: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Background

Background

In cryptography, one of the most studied problems is how to share asecret key over an insecure channel.

Key exchange methods are usually based on one-way functions, thatis functions which are easy to compute but whose inverses are difficultto determine.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 4: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Background

There are several ways in which group theory can be used to constructone-way functions.

In 1999, I. Anshel, M. Anshel and D. Goldfeld introduced a key ex-change protocol whose platform is a nonabelian group G .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 5: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Background

There are several ways in which group theory can be used to constructone-way functions.

In 1999, I. Anshel, M. Anshel and D. Goldfeld introduced a key ex-change protocol whose platform is a nonabelian group G .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 6: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 7: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 8: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 9: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 10: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 11: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 12: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Anshel-Anshel-Goldfeld

Circumstances: Alice and Bob want to agree on a common key.

Platform: let G be a nonabelian groupPUBLIC KEYSAlice chooses a1, . . . , al in G and makes them PUBLIC.

Bob chooses b1, . . . , bk in G and makes them PUBLIC.PRIVATE KEYSAlice chooses A ∈ 〈a1, . . . , al〉.

Bob chooses B ∈ 〈b1, . . . , bk〉.EXCHANGED INFORMATIONAlice computes b′1 = bA1 , . . . , b

′k = bAk , and sends them to Bob.

Bob computes a′1 = aB1 , . . . , a′l = aBl , and sends them to Alice.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 13: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 14: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 15: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 16: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 17: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 18: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 19: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 20: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 21: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

The shared key

The shared key is K = [A,B] = A−1B−1AB .

Alice determine K via:1 Write A = w(a1, . . . , al) as a word in a1, . . . , al .

2 Compute

A−1w(a′1, . . . , a′l) = A−1w(aB1 , . . . , a

Bl )

= A−1w(a1, . . . , al)B = A−1AB = [A,B] = K .

Bob uses the dual approach to determine K .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 22: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

EavesdroppingSince the conversation is not protected, an eavesdropper couldobtain b′1, . . . b

′k , and a′1, . . . a

′l as well.

Using the public data and the stolen information, one way to breakthe algorithm is the following:

find C ∈ 〈a1, . . . , al〉 such that

bC1 = b′1

. . .

bCk = b′k .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 23: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

EavesdroppingSince the conversation is not protected, an eavesdropper couldobtain b′1, . . . b

′k , and a′1, . . . a

′l as well.

Using the public data and the stolen information, one way to breakthe algorithm is the following:

find C ∈ 〈a1, . . . , al〉 such that

bC1 = b′1

. . .

bCk = b′k .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 24: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 25: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 26: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 27: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 28: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 29: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 30: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Breaking AAG

Note that C = xA for some x ∈ CG (B):

bCj = b′j = bAj implies bCA−1

j = bj , that is CA−1 ∈ CG (bj) forevery j = 1, . . . , k .

Therefore, CA−1 ∈ CG (b1, . . . , bm) ⊂ CG (B).

Write C = v(a1, . . . , al) as word in the generators ai , andcompute

C−1v(a′1, . . . , a′l) = C−1v(aB1 , . . . , a

Bl ) = C−1v(a1, . . . , al)

B

= C−1CB = (xA)−1B−1(xA)B = A−1x−1B−1xAB

= A−1B−1AB = [A,B]

obtaining the shared key.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 31: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

In order to break AAG, one needs to solve:

Word ProblemLet G be a finitely presented group. If you are given an element gin G , decide whether g = 1.

Multiple Conjugacy Search ProblemLet x1, . . . , xn, y1, . . . , yn be elements of G and suppose that thereexists C ∈ G such that

xC1 = y1

. . .

xCn = yn.

Find such a C .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 32: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

In order to break AAG, one needs to solve:

Word ProblemLet G be a finitely presented group. If you are given an element gin G , decide whether g = 1.

Multiple Conjugacy Search ProblemLet x1, . . . , xn, y1, . . . , yn be elements of G and suppose that thereexists C ∈ G such that

xC1 = y1

. . .

xCn = yn.

Find such a C .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 33: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

In order to break AAG, one needs to solve:

Word ProblemLet G be a finitely presented group. If you are given an element gin G , decide whether g = 1.

Multiple Conjugacy Search ProblemLet x1, . . . , xn, y1, . . . , yn be elements of G and suppose that thereexists C ∈ G such that

xC1 = y1

. . .

xCn = yn.

Find such a C .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 34: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

What features should a group G have to be suitable for AAG?

G requires fast multiplication and comparison of elements.

G should have a difficult multiple conjugacy search problem.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 35: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

What features should a group G have to be suitable for AAG?

G requires fast multiplication and comparison of elements.

G should have a difficult multiple conjugacy search problem.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 36: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

What features should a group G have to be suitable for AAG?

G requires fast multiplication and comparison of elements.

G should have a difficult multiple conjugacy search problem.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 37: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Recently, B. Eick and D.Kahrobaei investigated the algorithmic prop-erties of a special class of groups, namely

Polycyclic Groups

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 38: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Anshel-Anshel-Goldfeld

Recently, B. Eick and D.Kahrobaei investigated the algorithmic prop-erties of a special class of groups, namely

Polycyclic Groups

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 39: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Groups

Polycyclic Groups

A group G is said to be polycyclic if it has a chain of subgroups

G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1

in which each Gi+1 is a normal subgroup of Gi , and the quotientgroup Gi/Gi+1 is cyclic.

Such a chain of subgroups is called a polycyclic series.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 40: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Groups

Polycyclic Groups

A group G is said to be polycyclic if it has a chain of subgroups

G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1

in which each Gi+1 is a normal subgroup of Gi , and the quotientgroup Gi/Gi+1 is cyclic.

Such a chain of subgroups is called a polycyclic series.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 41: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Groups

Let G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 be a polycyclic series for G .

As Gi/Gi+1 is cyclic, for every index i there exists xi ∈ Gi such that

〈xiGi+1〉 = Gi/Gi+1. (1)

X = [x1, . . . , xn] is said to be a polycyclic sequence for G if (1) holdsfor i = 1, . . . , n.

The sequence of relative orders for X is the sequence

R(X ) = (r1, . . . , rn)

defined by ri = |Gi : Gi+1| ∈ N ∪ {∞}.

Moreover, we define I (X ) as the set of i ∈ {1, . . . , n} such that ri isfinite.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 42: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Groups

Let G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 be a polycyclic series for G .

As Gi/Gi+1 is cyclic, for every index i there exists xi ∈ Gi such that

〈xiGi+1〉 = Gi/Gi+1. (1)

X = [x1, . . . , xn] is said to be a polycyclic sequence for G if (1) holdsfor i = 1, . . . , n.

The sequence of relative orders for X is the sequence

R(X ) = (r1, . . . , rn)

defined by ri = |Gi : Gi+1| ∈ N ∪ {∞}.

Moreover, we define I (X ) as the set of i ∈ {1, . . . , n} such that ri isfinite.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 43: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Groups

Let G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 be a polycyclic series for G .

As Gi/Gi+1 is cyclic, for every index i there exists xi ∈ Gi such that

〈xiGi+1〉 = Gi/Gi+1. (1)

X = [x1, . . . , xn] is said to be a polycyclic sequence for G if (1) holdsfor i = 1, . . . , n.

The sequence of relative orders for X is the sequence

R(X ) = (r1, . . . , rn)

defined by ri = |Gi : Gi+1| ∈ N ∪ {∞}.

Moreover, we define I (X ) as the set of i ∈ {1, . . . , n} such that ri isfinite.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 44: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Groups

Let G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 be a polycyclic series for G .

As Gi/Gi+1 is cyclic, for every index i there exists xi ∈ Gi such that

〈xiGi+1〉 = Gi/Gi+1. (1)

X = [x1, . . . , xn] is said to be a polycyclic sequence for G if (1) holdsfor i = 1, . . . , n.

The sequence of relative orders for X is the sequence

R(X ) = (r1, . . . , rn)

defined by ri = |Gi : Gi+1| ∈ N ∪ {∞}.

Moreover, we define I (X ) as the set of i ∈ {1, . . . , n} such that ri isfinite.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 45: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Polycyclic Presentation

A presentation 〈x1, . . . , xn | R〉 is called a polycyclic presentation ifthere exist a sequence S = (s1, . . . , sn) with si ∈ N∪ {∞} and inte-gers ai ,k , bi ,j ,k , ci ,j ,k such that R consists of the following relations:

x sii = Ri ,i := xai,i+1i+1 · · · x

ai,nn for 1 ≤ i ≤ n, if si is finite;

xxji = Ri ,j := x

bi,j,j+1j+1 · · · xbi,j,nn for 1 ≤ j < i ≤ n;

xx−1j

i = Rj ,i := xci,j,j+1j+1 · · · xci,j,nn for 1 ≤ j < i ≤ n.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 46: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Polycyclic Presentation

A presentation 〈x1, . . . , xn | R〉 is called a polycyclic presentation ifthere exist a sequence S = (s1, . . . , sn) with si ∈ N∪ {∞} and inte-gers ai ,k , bi ,j ,k , ci ,j ,k such that R consists of the following relations:

x sii = Ri ,i := xai,i+1i+1 · · · x

ai,nn for 1 ≤ i ≤ n, if si is finite;

xxji = Ri ,j := x

bi,j,j+1j+1 · · · xbi,j,nn for 1 ≤ j < i ≤ n;

xx−1j

i = Rj ,i := xci,j,j+1j+1 · · · xci,j,nn for 1 ≤ j < i ≤ n.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 47: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Polycyclic Presentation

A presentation 〈x1, . . . , xn | R〉 is called a polycyclic presentation ifthere exist a sequence S = (s1, . . . , sn) with si ∈ N∪ {∞} and inte-gers ai ,k , bi ,j ,k , ci ,j ,k such that R consists of the following relations:

x sii = Ri ,i := xai,i+1i+1 · · · x

ai,nn for 1 ≤ i ≤ n, if si is finite;

xxji = Ri ,j := x

bi,j,j+1j+1 · · · xbi,j,nn for 1 ≤ j < i ≤ n;

xx−1j

i = Rj ,i := xci,j,j+1j+1 · · · xci,j,nn for 1 ≤ j < i ≤ n.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 48: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Polycyclic Presentation

A presentation 〈x1, . . . , xn | R〉 is called a polycyclic presentation ifthere exist a sequence S = (s1, . . . , sn) with si ∈ N∪ {∞} and inte-gers ai ,k , bi ,j ,k , ci ,j ,k such that R consists of the following relations:

x sii = Ri ,i := xai,i+1i+1 · · · x

ai,nn for 1 ≤ i ≤ n, if si is finite;

xxji = Ri ,j := x

bi,j,j+1j+1 · · · xbi,j,nn for 1 ≤ j < i ≤ n;

xx−1j

i = Rj ,i := xci,j,j+1j+1 · · · xci,j,nn for 1 ≤ j < i ≤ n.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 49: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Polycyclic Presentation

A presentation 〈x1, . . . , xn | R〉 is called a polycyclic presentation ifthere exist a sequence S = (s1, . . . , sn) with si ∈ N∪ {∞} and inte-gers ai ,k , bi ,j ,k , ci ,j ,k such that R consists of the following relations:

x sii = Ri ,i := xai,i+1i+1 · · · x

ai,nn for 1 ≤ i ≤ n, if si is finite;

xxji = Ri ,j := x

bi,j,j+1j+1 · · · xbi,j,nn for 1 ≤ j < i ≤ n;

xx−1j

i = Rj ,i := xci,j,j+1j+1 · · · xci,j,nn for 1 ≤ j < i ≤ n.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 50: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Word Problem

Suppose that G is given by a pc-presentation.

Let Gi = 〈xi , . . . , xn〉 for 1 ≤ i ≤ n + 1.

Consistency

A pc-presentation is consistence if si = |Gi : Gi+1| for everyi ∈ I (X ).

Normal Form in a Consistence PC-PresentationFor each g ∈ G there exists a unique vector (e1, . . . , en) ∈ Zn with0 ≤ ei < si if i ∈ I (X ) such that

g = xe11 . . . xenn .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 51: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Word Problem

Suppose that G is given by a pc-presentation.

Let Gi = 〈xi , . . . , xn〉 for 1 ≤ i ≤ n + 1.

Consistency

A pc-presentation is consistence if si = |Gi : Gi+1| for everyi ∈ I (X ).

Normal Form in a Consistence PC-PresentationFor each g ∈ G there exists a unique vector (e1, . . . , en) ∈ Zn with0 ≤ ei < si if i ∈ I (X ) such that

g = xe11 . . . xenn .

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 52: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Collection

Suppose an element g is given as a word in x1, . . . , xn.

The collection algorithm determines the normal form of g by aniterated rewriting of the word using the relations of the polycyclicpresentation.

EfficiencyThe collection algorithm is generally effective in practicalapplications.

For finite groups, collection was shown to be polynomial byLeedham-Green and Soicher.For infinite groups, Gebhardt showed that the complexitydepends on the exponents occurring during the collectionprocess, so it has no bound.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 53: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Collection

Suppose an element g is given as a word in x1, . . . , xn.

The collection algorithm determines the normal form of g by aniterated rewriting of the word using the relations of the polycyclicpresentation.

EfficiencyThe collection algorithm is generally effective in practicalapplications.

For finite groups, collection was shown to be polynomial byLeedham-Green and Soicher.For infinite groups, Gebhardt showed that the complexitydepends on the exponents occurring during the collectionprocess, so it has no bound.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 54: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Collection

Suppose an element g is given as a word in x1, . . . , xn.

The collection algorithm determines the normal form of g by aniterated rewriting of the word using the relations of the polycyclicpresentation.

EfficiencyThe collection algorithm is generally effective in practicalapplications.

For finite groups, collection was shown to be polynomial byLeedham-Green and Soicher.For infinite groups, Gebhardt showed that the complexitydepends on the exponents occurring during the collectionprocess, so it has no bound.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 55: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Collection

Suppose an element g is given as a word in x1, . . . , xn.

The collection algorithm determines the normal form of g by aniterated rewriting of the word using the relations of the polycyclicpresentation.

EfficiencyThe collection algorithm is generally effective in practicalapplications.

For finite groups, collection was shown to be polynomial byLeedham-Green and Soicher.For infinite groups, Gebhardt showed that the complexitydepends on the exponents occurring during the collectionprocess, so it has no bound.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 56: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

Conjugacy Search Problem

Multiple conjugacy search problem can be reduced to finitely manyiterations of single conjugacy search problem and centralizers com-putation.

Conjugacy Search Problem (CSP)

If g and h are conjugate elements of G , find u ∈ G such that

gu = h.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 57: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

How to solve CSP

Let G be given by a consistent pc-presentation. Let g , h ∈ G andU ≤ G :

ProblemsDecide if g and h are conjugate in U.

If g and h are conjugate, determine a conjugating elementin U.

Compute CU(g).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 58: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

How to solve CSP

Let G be given by a consistent pc-presentation. Let g , h ∈ G andU ≤ G :

ProblemsDecide if g and h are conjugate in U.

If g and h are conjugate, determine a conjugating elementin U.

Compute CU(g).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 59: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

How to solve CSP

Let G be given by a consistent pc-presentation. Let g , h ∈ G andU ≤ G :

ProblemsDecide if g and h are conjugate in U.

If g and h are conjugate, determine a conjugating elementin U.

Compute CU(g).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 60: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Polycyclic Presentation

How to solve CSP

Let G be given by a consistent pc-presentation. Let g , h ∈ G andU ≤ G :

ProblemsDecide if g and h are conjugate in U.

If g and h are conjugate, determine a conjugating elementin U.

Compute CU(g).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 61: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

"Privileged"

NilpotentWord Problem: can be solved evaluating polynomials, asshown by Leedham-Green and Soicher.

Conjugacy Search Problem: can be solved using inductionon a refinement of the lower central series, as shown by Sims.

Virtually NilpotentWord Problem: can be solved evaluating polynomials, asshown by Du Sautoy.

Conjugacy Search Problem: no special solution is known sofar.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 62: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

"Privileged"

NilpotentWord Problem: can be solved evaluating polynomials, asshown by Leedham-Green and Soicher.

Conjugacy Search Problem: can be solved using inductionon a refinement of the lower central series, as shown by Sims.

Virtually NilpotentWord Problem: can be solved evaluating polynomials, asshown by Du Sautoy.

Conjugacy Search Problem: no special solution is known sofar.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 63: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

"Privileged"

NilpotentWord Problem: can be solved evaluating polynomials, asshown by Leedham-Green and Soicher.

Conjugacy Search Problem: can be solved using inductionon a refinement of the lower central series, as shown by Sims.

Virtually NilpotentWord Problem: can be solved evaluating polynomials, asshown by Du Sautoy.

Conjugacy Search Problem: no special solution is known sofar.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 64: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Virtually Nilpotent Polycyclic Groups

Growth Rate

Let G be a finitely generated group. The growth rate of G is the asymptoticbehaviour of its growth function γ : N→ R defined as

γ(n) = |{w ∈ G : l(w) ≤ n}|,

where l(w) is the length of w as a word in the generators of G .

RemarkWolf and Milnor proved that polycyclic groups have polynomialgrowth rate if and only if they are virtually nilpotent.

Being the secret key a word in the group, the faster the growth ratethe larger the key space.Non-virtually nilpotent polycyclic groups seem to be good candidatesto use as platform groups, having exponential growth rate.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 65: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Virtually Nilpotent Polycyclic Groups

Growth Rate

Let G be a finitely generated group. The growth rate of G is the asymptoticbehaviour of its growth function γ : N→ R defined as

γ(n) = |{w ∈ G : l(w) ≤ n}|,

where l(w) is the length of w as a word in the generators of G .

RemarkWolf and Milnor proved that polycyclic groups have polynomialgrowth rate if and only if they are virtually nilpotent.

Being the secret key a word in the group, the faster the growth ratethe larger the key space.Non-virtually nilpotent polycyclic groups seem to be good candidatesto use as platform groups, having exponential growth rate.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 66: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Classes of Groups

{Polycyclic}

{Virtually Nilpotent Polycyclic}∪

→ {Supersoluble}←∪

{Finitely Generated Nilpotent}

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 67: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

What about Supersoluble?

A group G is said to be supersoluble if it has a chain of subgroups

G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1

in which each Gi is a normal subgroup of G , and the quotient groupGi/Gi+1 is cyclic.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 68: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

A Special Subgroup in Supersolubles

For any 1 ≤ i ≤ n, we can consider

CG (Gi/Gi+1) = {g ∈ G | [g , x ] ∈ Gi+1 for every x ∈ Gi}.

The intersection of all these centralizers

H =n⋂

i=1

CG (Gi/Gi+1)

is a normal nilpotent subgroup of G such that G/H is finite abelian.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 69: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

A Special Subgroup in Supersolubles

For any 1 ≤ i ≤ n, we can consider

CG (Gi/Gi+1) = {g ∈ G | [g , x ] ∈ Gi+1 for every x ∈ Gi}.

The intersection of all these centralizers

H =n⋂

i=1

CG (Gi/Gi+1)

is a normal nilpotent subgroup of G such that G/H is finite abelian.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 70: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Achievements

Recently, we focused our attention on the algorithmical propertiesof supersoluble groups, and we achieved a solution for MCSP insupersoluble groups.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 71: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Let G be a supersoluble group, and let T = {t1, . . . , tr} be atransversal to H in G .

PropositionLet x and y be elements of G . Then x and y are conjugate in G ifand only if x and y ti are conjugate in H for some i ∈ {1, . . . , r}.

Proof.If x and y ti are conjugate in H for some i , then of course x and yare conjugate in G .

Viceversa, suppose that x and y are conjugate in G =⋃r

i=1 tiH.Therefore, there exist u ∈ H and i ∈ {1, . . . , r} such thatx = y tiu = (y ti )u.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 72: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Let G be a supersoluble group, and let T = {t1, . . . , tr} be atransversal to H in G .

PropositionLet x and y be elements of G . Then x and y are conjugate in G ifand only if x and y ti are conjugate in H for some i ∈ {1, . . . , r}.

Proof.If x and y ti are conjugate in H for some i , then of course x and yare conjugate in G .

Viceversa, suppose that x and y are conjugate in G =⋃r

i=1 tiH.Therefore, there exist u ∈ H and i ∈ {1, . . . , r} such thatx = y tiu = (y ti )u.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 73: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Let G be a supersoluble group, and let T = {t1, . . . , tr} be atransversal to H in G .

PropositionLet x and y be elements of G . Then x and y are conjugate in G ifand only if x and y ti are conjugate in H for some i ∈ {1, . . . , r}.

Proof.If x and y ti are conjugate in H for some i , then of course x and yare conjugate in G .

Viceversa, suppose that x and y are conjugate in G =⋃r

i=1 tiH.Therefore, there exist u ∈ H and i ∈ {1, . . . , r} such thatx = y tiu = (y ti )u.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 74: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Let G be a supersoluble group, and let T = {t1, . . . , tr} be atransversal to H in G .

PropositionLet x and y be elements of G . Then x and y are conjugate in G ifand only if x and y ti are conjugate in H for some i ∈ {1, . . . , r}.

Proof.If x and y ti are conjugate in H for some i , then of course x and yare conjugate in G .

Viceversa, suppose that x and y are conjugate in G =⋃r

i=1 tiH.Therefore, there exist u ∈ H and i ∈ {1, . . . , r} such thatx = y tiu = (y ti )u.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 75: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Let G be a supersoluble group, and let T = {t1, . . . , tr} be atransversal to H in G .

PropositionLet x and y be elements of G . Then x and y are conjugate in G ifand only if x and y ti are conjugate in H for some i ∈ {1, . . . , r}.

Proof.If x and y ti are conjugate in H for some i , then of course x and yare conjugate in G .

Viceversa, suppose that x and y are conjugate in G =⋃r

i=1 tiH.Therefore, there exist u ∈ H and i ∈ {1, . . . , r} such thatx = y tiu = (y ti )u.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 76: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

If G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 is a normal cyclic series of G , wecan consider

G ≥ H = H1 ≥ . . . ≥ Hn ≥ Hn+1 = 1

where Hi = H ∩ Gi . So for any i

Hi / G ,G/H is finite abelian,Hi/Hi+1 is cyclic,Hi/Hi+1 ≤ Z (H/Hi+1).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 77: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

If G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 is a normal cyclic series of G , wecan consider

G ≥ H = H1 ≥ . . . ≥ Hn ≥ Hn+1 = 1

where Hi = H ∩ Gi . So for any i

Hi / G ,G/H is finite abelian,Hi/Hi+1 is cyclic,Hi/Hi+1 ≤ Z (H/Hi+1).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 78: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

If G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 is a normal cyclic series of G , wecan consider

G ≥ H = H1 ≥ . . . ≥ Hn ≥ Hn+1 = 1

where Hi = H ∩ Gi . So for any i

Hi / G ,G/H is finite abelian,Hi/Hi+1 is cyclic,Hi/Hi+1 ≤ Z (H/Hi+1).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 79: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

If G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 is a normal cyclic series of G , wecan consider

G ≥ H = H1 ≥ . . . ≥ Hn ≥ Hn+1 = 1

where Hi = H ∩ Gi . So for any i

Hi / G ,G/H is finite abelian,Hi/Hi+1 is cyclic,Hi/Hi+1 ≤ Z (H/Hi+1).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 80: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

If G = G1 ≥ G2 ≥ . . . ≥ Gn+1 = 1 is a normal cyclic series of G , wecan consider

G ≥ H = H1 ≥ . . . ≥ Hn ≥ Hn+1 = 1

where Hi = H ∩ Gi . So for any i

Hi / G ,G/H is finite abelian,Hi/Hi+1 is cyclic,Hi/Hi+1 ≤ Z (H/Hi+1).

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 81: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

CSP in Supersoluble1 Compute each centralizer CG (Gi/Gi+1) as kernel of some

homomorphisms between polycyclic groups.

2 Consider H =⋂n

i=1 CG (Gi/Gi+1).

3 Since H is nilpotent, use well-known methods to checkwhether x and y ti are conjugate in H.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 82: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

CSP in Supersoluble1 Compute each centralizer CG (Gi/Gi+1) as kernel of some

homomorphisms between polycyclic groups.

2 Consider H =⋂n

i=1 CG (Gi/Gi+1).

3 Since H is nilpotent, use well-known methods to checkwhether x and y ti are conjugate in H.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 83: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

CSP in Supersoluble1 Compute each centralizer CG (Gi/Gi+1) as kernel of some

homomorphisms between polycyclic groups.

2 Consider H =⋂n

i=1 CG (Gi/Gi+1).

3 Since H is nilpotent, use well-known methods to checkwhether x and y ti are conjugate in H.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 84: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 85: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 86: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 87: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 88: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 89: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 90: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

In order to solve the Multiple Conjugacy Search Problem, we shouldbe able to compute CU(v) for any v ∈ G and any U ≤ G .

It becomes easy if we manage to compute CG (v), since CU(v) =U ∩ CG (v).

We found an algorithm which works as follows.

Let T = {t1, . . . , tr} be a transversal to H in G . Then, {ti1hi1 , . . . , timhim}is a transversal to CH(v) in CG (v), where

vtij hij = v

for any j = 1, . . . ,m.

Determine S = {i ∈ {1, . . . , n} | v tihi = v}CG (v) = 〈CH(v), tihi | i ∈ S〉.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 91: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Special Behaviour of some Polycyclic Groups

Aims

We are now interested in studying the MCSP in virtually nilpotentgroups hoping to extend the supersoluble case.

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 92: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Bibliography

BIBLIOGRAPHY

I. Anshel, M. Anshel, D. GoldfeldAn algebraic method for public-key cryptography,Math. Res. Let., 6:287-291, 1999

B. Eick and D.KahrobaeiPolycyclic groups: a new platform for cryptography,preprint arxiv: math.gr/0411077. Technical report, 2004

V.GebhardtEfficient collection in infinite polycyclic groups,J. Symbolic Comput., 34(3):213-228, 2002

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 93: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Bibliography

J.WolfGrowth of finitely generated solvable groups and curvature ofRiemannian manifolds,Journal of Differential Geometry, pages 421-446, 1968

J.MilnorGrowth of finitely generated solvable groups,J. Differential Geom., 2(4):447-449,1968

M.Du SautoyPolycyclic groups, analytic groups and algebraic groups,Proc. London Math. Soc. (3), 85(1):62-92, 2002.

C. ,C. SimsComputation with finitely presented groups,Enciclopedia of mathematics and its application

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 94: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Bibliography

C. Leedham-Green, L. SoicherSymbolic collection using deep thought,LMS J. Comput. Math.,1:9-24, 1998

C. R. Leedham-Green, L. H. SoicherCollection from the left and other strategies,J. Symbolic Comput., 9(5-6):665-675, 1990. Computational grouptheory, Part 1.

J. Gryak, D. KahrobaeiThe status of polycyclic group-based cryptography: a surveyand open problems,arXiv:1607.05819 [cs.CR], 2016

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016

Page 95: On Polycyclic Group Based Cryptography - UniTrento · Background Background Incryptography,oneofthemoststudiedproblemsishowtosharea secretkeyoveraninsecurechannel. Keyexchangemethodsareusuallybasedonone-wayfunctions,that

Thank you for the attention!

On Polycyclic Group–Based Cryptography Carmine Monetta November 16, 2016


Recommended