Javascript must be enabled to continue!
Vector finite fields of characteristic two as algebraic support of multivariate cryptography
View through CrossRef
The central issue of the development of the multivariate public key algorithms is the design of reversible non-linear mappings of $n$-dimensional vectors over a finite field, which can be represented in a form of a set of power polynomials. For the first time, finite fields $GF\left((2^d)^m\right)$ of characteristic two, represented in the form of $m$-dimensional finite algebras over the fields $GF(2^d)$ are introduced for implementing the said mappings as exponentiation operation. This technique allows one to eliminate the use of masking linear mappings, usually used in the known approaches to the design of multivariate cryptography algorithms and causing the sufficiently large size of the public key. The issues of using the fields $GF\left((2^d)^m\right)$ as algebraic support of non-linear mappings are considered, including selection of appropriate values of $m$ and $d$. In the proposed approach to development of the multivariate cryptography algorithms, a superposition of two non-linear mappings is used to define resultant hard-to-reverse mapping with a secret trap door. The used two non-linear mappings provide mutual masking of the corresponding reverse maps, due to which the size of the public key significantly reduces as compared with the known algorithms-analogues at a given security level.
Moldova State University
Title: Vector finite fields of characteristic two as algebraic support of multivariate cryptography
Description:
The central issue of the development of the multivariate public key algorithms is the design of reversible non-linear mappings of $n$-dimensional vectors over a finite field, which can be represented in a form of a set of power polynomials.
For the first time, finite fields $GF\left((2^d)^m\right)$ of characteristic two, represented in the form of $m$-dimensional finite algebras over the fields $GF(2^d)$ are introduced for implementing the said mappings as exponentiation operation.
This technique allows one to eliminate the use of masking linear mappings, usually used in the known approaches to the design of multivariate cryptography algorithms and causing the sufficiently large size of the public key.
The issues of using the fields $GF\left((2^d)^m\right)$ as algebraic support of non-linear mappings are considered, including selection of appropriate values of $m$ and $d$.
In the proposed approach to development of the multivariate cryptography algorithms, a superposition of two non-linear mappings is used to define resultant hard-to-reverse mapping with a secret trap door.
The used two non-linear mappings provide mutual masking of the corresponding reverse maps, due to which the size of the public key significantly reduces as compared with the known algorithms-analogues at a given security level.
Related Results
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.
With the growing interest in cryptography --- from students and
researchers as well as from the general public --- there has been a
corresponding increase in the number of cryptogr...
Post-Quantum Public-Key Cryptoschemes on Finite Algebras
Post-Quantum Public-Key Cryptoschemes on Finite Algebras
One direction in the development of practical post-quantum public-key cryptographic algorithms is the use of finite algebras as their algebraic carrier. Two approaches in this dire...
A Survey about Post Quantum Cryptography Methods
A Survey about Post Quantum Cryptography Methods
Cryptography is an art of hiding the significant data or information with some other codes. It is a practice and study of securing information and communication. Thus, cryptography...
Bayes' Theorem for Multi-Bearing Faults Diagnosis
Bayes' Theorem for Multi-Bearing Faults Diagnosis
During the process of fault diagnosis for automated machinery, support vector machines is one of the suitable choices to categorize multiple faults for machinery. Regardless of the...
Advancements in Computational Algebraic Geometry: Techniques and Applications
Advancements in Computational Algebraic Geometry: Techniques and Applications
Computational algebraic geometry has experienced significant advancements in recent years, driven by both theoretical breakthroughs and practical applications comprehensive review ...
On Evaluation of Ensemble Forecast Calibration Using the Concept of Data Depth
On Evaluation of Ensemble Forecast Calibration Using the Concept of Data Depth
Abstract
Various generalizations of the univariate rank histogram have been proposed to inspect the reliability of an ensemble forecast or analysis in multidimension...
On algebraic systems
On algebraic systems
Abstract
The objective of this paper is to propose a generalization of algebraic closure space, namely algebraic system, and discuss its related properties. Firstly, we pro...
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
<div> The most known of public key cryptosystem was introduced in 1978 by Rivest, Shamir and Adleman [19] and now called the RSA public key cryptosystem in their honor. Later...

