Cryptanalysis of an MOR cryptosystem based on a finite associative algebra

The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYP- TO 2001, Paeng (2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate scheme for post-quantum attack. This paper analyses the security of a MOR cryptosystem...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Science China. Information sciences 2016-03, Vol.59 (3), p.133-141, Article 32111
Hauptverfasser: Wu, Wanqing, Zhang, Huanguo, Wang, Houzhen, Mao, Shaowu, Wu, Shuomei, Han, Haiqing
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The Shor algorithm is effective for public-key cryptosystems based on an abelian group. At CRYP- TO 2001, Paeng (2001) presented a MOR cryptosystem using a non-abelian group, which can be considered as a candidate scheme for post-quantum attack. This paper analyses the security of a MOR cryptosystem based on a finite associative algebra using a quantum algorithm. Specifically, let L be a finite associative algebra over a finite field F. Consider a homomorphism Ф : Aut(L) → Aut(H) × Aut(I), where I is an ideal of L and H ≌ L/I. We compute dim Im(Ф) and dim Ker(Ф), and combine them by dim Aut(L) = dim Ira(C) + dim Ker(Ф). We prove that Im(Ф) = Stabcomp(H,l)(μ + B2(H, I)) and Ker(Ф) ≌ ZI(H, I). Thus, we can obtain dimlm(Ф), since the algorithm for the stabilizer is a standard algorithm among abelian hidden subgroup algorithms. In addition, Z1 (H, I) is equivalent to the solution space of the linear equation group over the Galois fields GF(p), and it is possible to obtain dim Ker(Ф) by the enumeration theorem. Furthermore, we can obtain the dimension of the automorphism group Aut(L). When the map φ ∈ Aut(L), it is possible to effectively compute the cyclic group (φ) and recover the private key a. Therefore, the MOR scheme is insecure when based on a finite associative algebra in quantum computation.
ISSN:1674-733X
1869-1919
DOI:10.1007/s11432-015-5447-y