MATHEMATICAL CRYPTOLOGY
Abstract
AI
AI
This work discusses mathematical cryptology, focusing on the principles of encryption and decryption processes. It categorizes cryptographic systems into symmetric and nonsymmetric types, elaborating on the characteristics of each, notably the key management issues associated with symmetric cryptography. The paper highlights the fundamental structures of cryptosystems, including their components and functionalities, and refers to key foundational works in the field.
References (56)
- 's quantum computers are very small and have no practical meaning. Handling bigger quantum registers with quantum computers would however mean that procedures central for the safety of for example RSA and ELGAMAL, such as factorization and computing discrete logarithms modulo a prime, could be performed in polynomial time. Indeed, these problems are in the class BQP. This was shown by Peter Shor in 1994. Let's see Shor's factorization algorithm here. See the reference SHOR mentioned in Footnote 2. Shor's factorization algorithm is very similar to the exponent algorithm for cryptanalysis of RSA in Section 8.3. The mysterious algorithm A, that appeared there, is just replaced by a quantum algorithm. Of course, the number n to be factored can here have many more prime factors than just two. The "classical part" of the algorithm is the following when the input is the integer n ≥ 2: Shor's factorization algorithm: 1. Check whether n is a prime. If it is then return n and quit.
- Check whether n is a higher power of some integer, compare to the Agrawal-Kayal- Saxena algorithm in Section 7.4. If n = u t , where t ≥ 2, we continue by finding the prime factors of u from which we then easily obtain the factors of n. This part, as the previous one, is included only to take care of some "easy" situations quickly.
- Choose randomly a number w from the interval 1 ≤ w < n.
- Compute d = gcd(w, n) by the Euclidean algorithm.
- If d = 1, compute with the quantum computer a number r > 0 such that w r ≡ 1 mod n.
- If r is odd, go to #9.
- If r is even, set r ← r/2 and go to #7.
- Compute ω = (w r ,mod n) by the algorithm of Russian peasants.
- If ω ≡ 1 mod n, give up and quit.
- If ω ≡ 1 mod n, set ω ′ ← ω and ω ← (ω 2 ,mod n), and go to #11.
- Eventually we obtain a square root ω ′ of 1 modulo n such that ω ′ ≡ 1 mod n. If now ω ′ ≡ -1 mod n, give up and quit. Otherwise compute t = gcd(ω ′ -1, n) and continue from t and n/t. Note that because ω ′ + 1 ≡ 0 mod n and on the other hand ω ′2 -1 = (ω ′ + 1)(ω ′ -1) ≡ 0 mod n, some prime factor of n is a factor of ω ′ -1.
- So, #6 is left to be performed with the quantum computer. This can be done based on the fact that (w j ,mod n) is periodic with respect to j and a period r can be found by a quantum Fourier transformation. The procedure itself is the following: References
- BAUER, F.L.: Decrypted Secrets. Methods and Maxims of Cryptography. Springer- Verlag (2006)
- BLAKE, I. & SEROUSSI, G. & SMART, N.: Elliptic Curves in Cryptography. Cambridge University Press (2000)
- BUCHMANN, J.: Introduction to Cryptography. Springer-Verlag (2004)
- COHEN, H.: A Course in Computational Algebraic Number Theory. Springer-Verlag (2000)
- CRANDALL, R. & POMERANCE, C.: Prime Numbers. A Computational Perspective. Springer-Verlag (2005)
- DAEMEN, J. & RIJMEN, V.: Design of Rijndael. AES-The Advanced Encryption Stan- dard. Springer-Verlag (2002)
- DING, C. & PEI, D. & SALOMAA, A: Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography. World Scientific (1999)
- DU, D.-Z. & KO, K.-I: Theory of Computational Complexity. Wiley (2000)
- GARRETT, P.: Making, Breaking Codes. An Introduction to Cryptology. Prentice-Hall (2007)
- GOLDREICH, O.: Modern Cryptography, Probabilistic Proofs, and Pseudorandomness. Springer-Verlag (2001)
- GOLDREICH, O.: Foundations of Cryptography. Basic Tools. Cambridge University Press (2007)
- GOLDREICH, O.: Foundations of Cryptography. Basic Applications. Cambridge Univer- sity Press (2009)
- HOFFSTEIN, J. & PIPHER, J. & SILVERMAN, J.H.: An Introduction to Mathematical Cryptography. Springer-Verlag (2008)
- HOPCROFT, J.E. & ULLMAN, J.D.: Introduction to Automata Theory, Languages, and Computation. Addison-Wesley (1979)
- KATZ, J. & LINDELL, Y.: Introduction to Modern Cryptography. Chapman & Hall / CRC (2008)
- KNUTH, D.E.: The Art of Computer Programming Vol. 2: Seminumerical Algorithms. Addison-Wesley (1998)
- KOBLITZ, N.: A Course in Number Theory and Cryptography. Springer-Verlag (2001)
- KOBLITZ, N.: Algebraic Aspects of Cryptography. Springer-Verlag (2004)
- KONHEIM, A.G.: Cryptography. A Primer. Wiley (1981)
- KRANAKIS, E.: Primality and Cryptography. Wiley (1991)
- LIDL, R. & NIEDERREITER, H.: Finite Fields. Cambridge University Press (2008)
- LIPSON, J.D.: Elements of Algebra and Algebraic Computing. Addison-Wesley (1981)
- MAO, W.: Modern Cryptography. Theory and Practice. Pearson Education (2004)
- MCELIECE, R.J.: Finite Fields for Computer Scientists and Engineers. Kluwer (1987)
- MENEZES, A. & VAN OORSCHOT, P. & VANSTONE, S.: Handbook of Applied Cryp- tography. CRC Press (2001)
- MIGNOTTE, M.: Mathematics for Computer Algebra. Springer-Verlag (1991)
- MOLLIN, R.A.: An Introduction to Cryptography. Chapman & Hall / CRC (2006)
- MOLLIN, R.A.: RSA and Public-Key Cryptography. Chapman & Hall / CRC (2003)
- MOLLIN, R.A.: Codes. The Guide to Secrecy from Ancient to Modern Times. Chapman & Hall / CRC (2005)
- NIELSEN, M.A. & CHUANG, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2000)
- PAAR, C. & PELZL, J.: Understanding Cryptography. A Textbook for Students and Practitioners. Springer-Verlag (2009)
- RIESEL, H.: Prime Numbers and Computer Methods for Factorization. Birkhäuser (1994)
- ROSEN, K.H..: Elementary Number Theory. Longman (2010)
- ROSING, M.: Implementing Elliptic Curve Cryptography. Manning Publications (1998)
- SALOMAA, A.: Public-Key Cryptography. Springer-Verlag (1998)
- SCHNEIER, B.: Applied Cryptography. Protocols, Algorithms, and Source Code in C. Wiley (1996)
- SHOUP, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press (2005)
- SHPARLINSKI, I.: Cryptographic Applications of Analytic Number Theory. Complexity Lower Bounds and Pseurandomness. Birkhäuser (2003)
- SIERPINSKI, W.: Elementary Theory of Numbers. Elsevier (1988)
- SILVERMAN, J.H. & TATE, J.: Rational Points on Elliptic Curves. Springer-Verlag (1992)
- STINSON, D.R.: Cryptography. Theory and Practice. Chapman & Hall / CRC (2006)
- TRAPPE, W. & WASHINGTON, L.C.: Introduction to Cryptography with Coding Theory. Pearson Education (2006)
- WAGSTAFF, S.S.: Cryptanalysis of Number Theoretic Ciphers. Chapman & Hall / CRC (2003)
- WASHINGTON, L.C.: Elliptic Curves. Number Theory and Cryptography. Chapman & Hall / CRC (2008)