The present disclosure relates to cryptography, and in particular relates to key agreement for cryptography.
In cryptography, key agreement schemes define a set of rules for how two parties may each choose a secret, and then compute a shared secret based on such choice. Key agreement schemes are sometimes referred to as key exchange or key establishment schemes.
The most famous form of key agreement is referred to as the Diffie-Hellman (DH) key agreement. Various forms of Diffie-Hellman key agreements exist, including elliptical curve forms, which are commonly used on many websites.
However, quantum computers are emerging as a potential computing platform. Quantum computers use “quantum bits” rather than binary digits utilized in traditional computers. Such quantum computers would theoretically be able to solve certain problems much more quickly than classical computers, including integer factorization, which is the strength behind the Diffie-Hellman key agreement scheme.
In particular, Peter Shor formulated Shor's quantum algorithm in 1994. This algorithm is known to attack the Diffie-Hellman key agreement if a sufficiently powerful quantum computer can be built. Utilizing such algorithm, the risk of a quantum computer discovering the secret for one or both parties in a Diffie Hellman key agreement scheme is nonzero. Therefore, counter measures to Shor's algorithm are needed.
The present disclosure will be better understood with reference to the drawings, in which:
The present disclosure provides a method for key agreement between a first party and a second party over a public communications channel, the method comprising: selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
The present disclosure further provides a computing device configured for key agreement between a first party and a second party over a public communications channel, the computing device comprising: a processor; and a communications subsystem, wherein the computing device is configured to: select, from a semigroup, a first value “a”; multiply the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; send the third value “d” to the second party; receive, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and create a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
The present disclosure further provides a computer readable medium for storing instruction code for key agreement between a first party and a second party over a public communications channel, the instruction code, when executed by a processor of a computing device cause the computing device to: select, from a semigroup, a first value “a”; multiply the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; send the third value “d” to the second party; receive, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and create a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
In accordance with the present disclosure, semigroups, which are a category of mathematical objects in algebra, may be used as a basis for key agreement schemes. Any semigroup may be used as the basis for a key agreement scheme, and further the new construction allows for any key agreement scheme to be constructed in this way, including existing schemes such as the Diffie-Hellman key agreement, and the Supersingular Isogeny Diffie-Hellman (SIDH) key agreement scheme.
However, not all semigroups are appropriate for key agreement schemes. Therefore, in accordance with some embodiments of the present disclosure, a choice of semigroups may be limited for key agreement based on various characteristics of the semigroup. In particular, structurally secure semigroups may be defined based on either trial elimination or restriction. Restriction can occur based on characteristics of the semigroup.
In a further embodiment the present disclosure, semigroups may be constructed using building blocks such as other semigroups or other types of algebraic objects, including semirings or arbitrary functions. Such construction may enhance the security of a key agreement scheme.
In a further embodiment of the present disclosure, the use of a particular semigroup may be negotiated between the parties to the key agreement scheme. This may allow for cryptoagility and security by obscurity through the selection of one of many semigroup key agreement schemes to utilize for a particular transaction.
These and other aspects are described below.
Key Agreement
In key agreement schemes, two parties wish to create a secure communication utilizing a secret key, where both parties have made a contribution to such secret key.
Reference is made to
In the embodiment of
Based on the generated secret “a” at block 110, Alice then computes a value “d” utilizing an algorithm P1 and the secret “a”, as seen at block 120.
Similarly, Charlie computes a value “e” utilizing an algorithm P2 and the secret “c”, as shown at block 122.
Alice then delivers the value “d” to Charlie, as shown by message 130. Similarly, Charlie delivers the value “e” in message 132 to Alice. For both messages 130 and 132, delivery is considered to be reliable and authenticated using some mechanism.
Based on the receipt of value “e”, Alice may then compute a value “f” utilizing an algorithm P3, the generated secret “a” from block 110, and the received public value “e” from message 132, as seen at block 140.
Similarly, Charlie may compute a value “g” using an algorithm P4 with the secret generated at block 112, along with the value “d” received at message 130, as shown at block 142.
The computations used in the key agreement are such that f=g using algorithm P4, and therefore Alice and Charlie now share a secret, namely f=g. Such shared secret has contributions by both parties.
Such shared secret may then be used, for example, as a symmetric key for both encryption and authentication of content and messages in future communications.
The embodiment of
While the embodiment of
However, in the embodiments described below, all key agreement schemes are asynchronous. One example of such asynchronous scheme may be the Internet Engineering Task Force (IETF) protocol Transport Layer Security (TLS), which protects the HyperText Transport Protocol Secure (HTTPS) connections between clients and servers. The TLS protocol has two phases, namely a handshake and a record layer. The handshake is done first and uses public key cryptography in the form of a key agreement, and other aspects such as digital signatures for authentication.
The TLS handshake has an elliptical curve Diffie-Hellman (ECDH) key agreement as an option, and TLS 1.3 requires some form of Diffie-Hellman key agreement, which may be either EDCH or classic DH.
The DH parts of a TLS handshake are asynchronous. For example, a server Alice and client Charlie use the handshake to agree on a master key. The master key is in used to derive session keys which are used in the TLS record layer to protect subsequent content data such as downloaded and uploaded webpages and similar web traffic.
The TLS record layer does not use public key cryptography, so it does not use key agreement, but rather provides a useful application of key agreement.
Semigroups
Semigroups are a category of mathematical objects in algebra. Each semigroup S has a set of elements, and a binary operation defined on the set. The binary operation must be associative. This means that:
a(bc)=(ab)c (1)
In equation 1 above, a, b and c are in the semigroup S. Equation 1 indicates that when computing the product abc of three elements a, b and c, it does not matter if one multiplies a and b first, getting some value d=ab, and then multiplying d by c to get abc=dc, or if one first multiplies b and c to get a value e=bc and then multiplying a and e to get abc=ae.
Any set equipped with an associative binary operation is a semigroup.
Two examples of semigroup includes positive integers {1,2,3, . . . } under addition, and positive integers {1,2,3, . . . } under multiplication. These two examples share the same set, but have a different binary operation. As will be appreciated by those skilled in the art, there are many other subgroups besides the two defined above.
When discussing a general semigroup S, it is often assumed that the operation is written as multiplication. Furthermore, when a and b are variables represented with values in S, the product is written as ab, omitting any multiplication sign. However, in particular specific semigroups, such as positive integers under addition, a symbol “+” for a binary operation is used and the operation of the written as a+b instead of ab.
In some cases, semigroups S are commutative, which means that which means that ab=ba for all a,b in S. In the example using the positive integer semigroups defined above, both examples are commutative.
Other semigroups are non-commutative. For example, matrices under multiplication would be non-commutative. In that case, in the product abc, the positions of a, b, and c matter for such product. Thus, abc may be different than bac and cab.
However, associativity means that in the product abc, the order in which the two multiplications are carried out does not matter. Thus, either ab or bc could be computed first, but the final result is the same.
In accordance with the present disclosure, semigroups have a multiplication operator.
Semigroups are however not required to have a division operator. In some cases, a division operator may be formed, and is written as “/”. A division operator is a binary operator having left and right input. If / is a binary operator on semigroup S, / may be defined as a strong divider if:
(ab)/b=a (2)
Where equation 2 above is valid for all a,b in S.
The operator / may be defined as a partial strong divider if equation 2 above only holds for a subset of a,b values within S.
In semigroup nomenclature, the operation is generally written as ab/b instead of (ab)/b, which means that multiplications are done before divisions.
Further, a weak divider may also be defined for a semigroup. In particular, sometimes a semigroup has multiplication in which ab=db for many different values of d. In this case, there cannot be a strong divider. A “/” is a weak divider if:
(ab/b)b=ab (3)
In equation 3, the weak divider is defined for all a, b and S.
A partial weak divider utilizes equation 3, but is only valid for a subset of values a, b within S.
In equations 2 and 3 above, the divider / is also called a right divider. Similarly, a binary operation “\” is called a left divider. The operator \ is a strong left divider if b\ba=a. Further, the binary operator \ is a weak left divider if b(b\ba)=ba.
In various semigroups, a divider operation may be known. For example, for positive integers under multiplication, it is the usual Euclidean division algorithm. For positive integers under addition, the division may become subtraction. Dividers are known for some matrix subgroups, where Bareiss elimination can be used.
Further, many of the constructions of a semigroup use a concept known as a semiring. A semiring R has two binary operations, namely addition and multiplication, each forming a semigroup on R. Addition is also commutative. Multiplication is distributed over addition, meaning that a(b+c)=ab+ac and (a+b)c=ac+bc for all a,b,c, in R. A basic example of a semiring includes positive integers under the usual addition and multiplication operations.
Converting a Semigroup into a Key Agreement Scheme
In accordance with the embodiments of the present disclosure, any semigroup may be converted into a key agreement scheme. Indeed, such construction allows for every key agreement scheme to be constructed in this way, including existing schemes such as DH key agreements and SIDH key agreements.
Based on the above, if a secure, post quantum resistant key agreement scheme is possible, it can be created utilizing the methods and systems in accordance with the present disclosure, along with some subgroup.
Reference is now made to
In accordance with the embodiment of
Similarly, at block 212, Charlie chooses a secret “c” found within the semigroup S.
Further, as seen at block 220 and 222, both Alice and Charlie choose a value “b” found within the semigroup S. The value b can be a public fixed value, or a prearranged secret value such as something derived from a password shared between Alice and Charlie. Other options for determining b are possible. Based on this, the value “b” can be a public value or can be a weak shared secret in some cases.
At block 230 Alice computes a value d=ab. Similarly, at block 232, Charlie computes a value “e” where e=bc.
Thereafter, as seen by message 240, Alice delivers the value “d” to Charlie. Similarly, in message 242, Charlie delivers the value “e” to Alice.
At block 250, Alice computes f=ae. At block 252, Charlie computes g=dc.
Since S is a semigroup, multiplication is associative. Therefore, f=ae=a(bc)=(ab)c=dc=g.
Based on this, both Alice and Charlie compute the same value f=g.
In the embodiment of
Comparing the embodiments of
In the embodiment of
Further, the embodiment of
Further, the associativity of the semigroup is used to ensure that f=g. Conversely, in
Using the embodiment of
For example, various paraments of the semigroup may indicate a lack of security. In particular, a semigroup S that is used for key agreement must not have an efficient divider operator. If it did, then an adversary could compute Alice's secret a as a=d/b when b is public or if b is a weak secret such as a password. Once the attacker figures out the secret a, the attacker can copy Alice's computations at block 250 to obtain the shared secret f=ae.
Similarly, no efficient left divider should exist within the semigroup S to avoid security issues.
Other elements to be considered when choosing the secure semigroup S are provided below.
Wedge Problem
Generally when choosing a semigroup, a wedge problem, as defined below, should be hard to solve.
In particular, a ternary operation with three inputs: a left input, a middle input, and a right input is considered in this case. If the three inputs are ab, b, bc, then the output should be abc.
Specifically, each triple (a,b,c) of values in S generates an input (ab), b, bc) to the wedge problem. A goal of an attacker is to find a “wedge operator” that would allow generation of a target output of abc from such inputs. In the present disclosure, the triplet (a,b,c) is called the seat of the problem. Input ab is the left input, the value b is the middle input, and the value bc is the right input.
Many different seeds (a,b,c) could lead to the same input (ab, b, bc). However the value of abc is determined uniquely by the input.
For example, suppose that (a′, b′, c′) leads to the same input, so that (a′b′, b′, b′c′)=(ab, b, bc). In this case abc=(a′b′)c=a′(b′c)=a′(b′)c=a′(b)c=a′(bc)=a′(b′c′)=a′b′c′.
In this regard, the wedge problem is to find an efficient algorithm to implement such function. Without loss of generality, it can be assumed that the algorithm is deterministic, and therefore the algorithm computes an approximation of the true wedge function where the use of the term approximate is in the sense of being correct with some probability. The wedge function is a ternary function.
Because the wedge function exists, the wedge problem is a computational problem. An adversary who uses the wedge problem to attack an associative key agreement scheme merely has to solve the computational problem.
To denote the above, a wedge operator A is defined. Further, the middle input is provided as a lowered subscript to the right of this symbol in accordance with the present disclosure. For example, equation 4 below provides such wedge operation
d{circumflex over ( )}be (4)
In Equation 4 above, d is the left input, b is the middle input and e is the right input.
It should be noted that the {circumflex over ( )} symbol, as used in the present disclosure, should not be confused with the symbol and other names in others of mathematics and computer programming
Further, in mathematics, the term “wedge operator” or “wedge product” is often used with various meanings. Most often it is used to be synonymous with a “exterior product”. However, again these terms should not be confused with a wedge operator as defined in the present disclosure. Specifically, as used herein, the wedge operator {circumflex over ( )}b is defined by equation 5 below.
ab{circumflex over ( )}bbc=abc (5)
Equation 5 holds for all a, b, c in S.
In accordance with the present disclosure, the value b is often fixed, in which case {circumflex over ( )}b is considered to be a binary operator. If b was chosen as a weak secret, such as a prearranged password, then a dictionary attack may be used to find b.
Further, as used herein, partial wedge operators are defined as those which are successful only for a certain subset of the values of a,b,c in the semigroup S.
Further, in accordance with the present disclosure, we allow wedge function to be defined for input to triplets (d,b,e) which are not of the form (ab,b,bc). These input triples are called irrelevant inputs and the output values are irrelevant. Further, it is not required for a wedge function to identify whether an input is relevant.
Generally, as used herein, the wedge problem is only of interest when the seed (a,b,c) is restricted in some manner. In particular, when a is Alice's secret, c is Charlie's secret and so on. For other values of (a,b,c) we may not mind if the wedge problem is easy to solve. In this case, the corresponding instance of the wedge problem is also irrelevant.
If an adversary can effectively compute a wedge operator {circumflex over ( )}b in S, then such adversary can break the key agreement scheme built from S. Since the adversary observes the public values d and e, and determines the value b, which can either be a public or a weak secret, the adversary may then compute equation 6 below.
d{circumflex over ( )}be=ab{circumflex over ( )}bbc=abc=f (6)
From equation 6, one criteria for choosing a semigroup is that the wedge problem is hard to solve. For example, the wedge problem may be implemented using a partial wedge operator for relevant values of the (a,b,c) used in the key agreement.
Certain semigroups can be eliminated from contention based on the such wedge problem. For example, idempotent semigroups (also known as bands) may be eliminated. An element b is idempotent if bb=b. An idempotent semigroup, by definition, has all elements idempotent, including input b to the wedge problem. In this case, multiplication can serve as the binary version of the wedge operator.
Further, polarized semigroups may also be eliminated. A semigroup is defined to be polarized if abc=ac for all a,b,c. In this case, multiplication provides the wedge operator and thus polarized semigroups should similarly be avoided.
Other examples to eliminate semigroups based on the wedge problem are also possible.
Structurally Secure Semigroups
Typical Diffie-Hellman groups, such as elliptic curves and modular multiplication groups, are cyclic groups, which are known to be isomorphic to modular addition groups. As used herein, isomorphic means that they share the same underlying group structure, even though they have different representations. Modular integer addition groups would be insecure if used as Diffie-Hellman groups since the division problem is easy. Fortunately, finding isomorphism is difficult (except by Shor's quantum computer algorithm), even though it is known to exist.
Accordingly, it can be said that elliptic curve groups and modular multiplication groups are “structurally insecure” as Diffie-Hellman groups, because they share the same structure as insecure Diffie-Hellman groups (modular addition groups). It should be noted by those skilled in the art that just saying a scheme is structurally insecure does not mean that it is insecure. However, such scheme may be suspected to be insecure because the only thing between such scheme and attack is isomorphism, which is known to exist. Such existential threat is commonplace in cryptography, but nonetheless it may be beneficial to find a cryptographic scheme for which there is no known existential threat. Such a scheme would be deemed to be structurally secure.
One specific example of a structurally secure scheme is known as the Vernam cipher, also known as a one-time pad. It has been proven that the confidentiality of such cipher is unconditionally secure. Such a scheme is therefore structurally secure. However, the one-time pad has other security issues (as it does not provide message integrity or authentication) and has practicality issues (that the one-time pad must be equal in size to the message, among other factors).
However, a one-time pad is not a key agreement scheme, but it is structurally secure in the sense above.
In accordance with the present disclosure, structurally secure agreement schemes are sought.
Similarly, a semigroup may be structurally insecure if it has the same structure as the known weak semigroup. Therefore, in accordance with one embodiment of the present disclosure, to avoid structurally insecure semigroups two options are provided. A first is referred to as trial elimination, and the second is referred to as restriction.
With regard to trial elimination, reference is now made to
If yes, the process then proceeds to block 330 in which the semigroup is eliminated. The process then proceeds to block 350 and ends.
Rather than moving to block 350, the process may continue from block 330 by selecting a new semigroup to examine and then proceeding back to block 312.
Conversely, at block 320, if it is determined that there are no weak semigroups that are known, then the process may proceed to block 340 in which the semigroup may be kept as a possibility for a key agreement scheme.
A second strategy is referred to herein as restriction. In restriction, a property of the semigroup structure may be considered. Reference is now made to
In particular, the process of
The list of properties in Table 1 above is not exhaustive. Other properties may also be considered in accordance with the embodiment of
Based on the properties in Table 1 above, the process may proceed to block 420 in which a determination is made to consider whether the property is favorable to security or not. If the property is not favorable, the process proceeds to block 430 in which all semigroups with that property are avoided for the selection of the semigroup for the key agreement scheme. A property is not favorable to security if such property renders the keys computationally vulnerable to being discovered.
The process then proceeds from block 430 to block 450 and ends. In other embodiments, instead of proceeding to block 450, the process may proceed from block 430 back to block 412 in which a different property may be examined for the semigroup.
Alternatively, if the property is favorable for security then the process may proceed to block 440 in which the semigroup is kept and may again be further analyzed at block 412 with other properties. Alternatively, if the properties that are being examined have all been examined, the process may then select such semigroup as a possibility for a key agreement scheme and the process may proceed to block 450 and end.
Constructed Semigroups
In a further embodiment, semigroups can be constructed using building blocks such as other semigroups, or other types of algebraic objects, such as semirings, and even arbitrary functions. These constructed semigroups can have the same or better security (harder wedge problem) than the individual building blocks.
Thereafter, each semigroup construction can be used to build a key agreement scheme. The semigroup construction can use the same or diverse types of building blocks to form such semigroup.
As used herein, a semiring is a pair of semigroups sharing the sets, with one operation written additively and the other multiplicatively. Further, in a semiring, distributive laws hold. In particular, a(b+c)=ab+ac and (a+b)c=ac+bc. Unless noted otherwise, addition in a semiring is assumed to be commutative.
To avoid confusion, in the embodiments below, constructions from building blocks are distinguished by labelling the building blocks with the adjective “base”. For example, if a given semiring is taken as a building block, such as a semiring R of positive integers, then we construct a semiring S of 3×3 square matrices whose entries belong to R. Since both R and S are semirings, to avoid confusion we say that R is the base semiring. In this case, each semiring element (of S) is a matrix whose entries belong to the base semiring R.
Table 2 below provides a partial list of example constructions that can be used to build a semigroup. In many cases, such semigroup may be built from other building blocks, such as other semigroups or sometimes through a semiring.
Utilizing the embodiments of Table 2 above, in a direct product of the base semigroups, the resulting semigroup is at least as secure as the strongest base semigroup. This is the strongest link construction.
In other constructions, each construction may boost the security compared to the base objects. Thus, the aim is for security amplification.
In one example, consider a semigroup based on resultants of bivariate polynomials. The semigroup is first described mathematically. The details of using such semigroup in a cryptographic system are then described.
Let Z be the ring of integers. Let Z[x,y] be the set of bivariate polynomials with integer coefficients. Normally, Z[x,y] is treated like a ring R, under polynomial and addition, but here we give Z[x,y] a different semiring structure B. Addition in B, written as +B, is multiplication in R. Multiplication in B, written as *, uses the resultant operation, so (f*g)(x,y)=Rest(f(x,t),g(t,y)).
Now, B is a semiring with non-commutative multiplication. This follows from the well-known theory of resultants. For example, Res(f,gh)=Res(f,g)Res(f,h), proves the distributive law.
In particular, a semigroup S can be formed, with multiplication written *, by using 2 by 2 square matrices with entries in B, and where S multiplication is B-matrix multiplication (using operations in B).
An example of multiplication in S. Let
Then:
So, now there are eight resultants to compute. One way to compute a resultant is to compute the determinant of the Sylvester matrix.
In this disclosure, the horizontal, ascending version of the Sylvester matrix is defined. The Sylvester matrix is a square matrix with sides length equal to the sum of the degrees in the active variables, in this case variable t. The t coefficients of each input polynomial are arranged horizontally, in ascending order, from the lowest degree term to the highest. Zeros fill the remaining entries of the row. Each polynomial is used in a number of rows matching the degree of the other polynomial. Each use of the polynomial is shifted once to the right, until it reaches the right side of the matrix.
Other arrangements, such as vertical or descending, for the Sylvester matrix are also possible (and sometimes used in textbooks), but they at most change the sign.
For example,
The determinant in this case is 72xy2+64. Computing all 8 determinants similarly, one gets that:
Finally, one can expand each entry, which are given above as standard polynomial products, into sums, as follows:
For better security, starting polynomials (a and b) should be chosen with higher degrees and larger coefficients. Also, matrices with more rows and columns may be used. It should then be much more difficult to determine a from a*b and b.
The typical known algorithms for matrix division, such as Bareiss reduction, work over matrices with entries in a commutative ring. But here the matrix entries are not commutative, and not even a ring. For example, subtraction is not possible. Perhaps B can be extended to a ring, by introducing formal differences (in a manner similar to how negative integers can be introduced as formal difference of positive integers). But then division and the non-commutativity need to be dealt with. These difficulties may represent a significant hurdle to cryptanalysis.
Those skilled in the art may notice that that a*b was initially obtained in a form whose entries were products of resultants over the entries a and b. If the entries of a*b can be factored, then the factors can try to be matched to the entries of b, and then division in the semiring B be performed, to extract the entries of b.
This attack strategy requires polynomial factorization. Polynomial factorization, for large integer coefficients and high degree polynomials can be difficult for conventional (non-quantum) computers.
A quantum computer may make polynomial factorization easier. However, to address the quantum computer risk, another measure can be used. Ensure the input matrices a and b have entries which are products too. The product a*b matrix entries can still be factored, but now there may be many more factors, and there may not be any easy way to match factors of the a*b entries to those of b.
Table 2 above listed various well-known construction of semi-groups that may be used to build up semigroups (from more base semigroups) with better security.
For Alice and Charlie to use such semigroups, they need to be able to send and represent semigroup elements to each other. So, that means that they must have some means of converting a semigroup element into a sequence of bytes. Such byte representations are commonly used in cryptography. They are used in Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC) and many other systems.
A system for the semigroup based on resultants, which was described mathematically above, is described below.
In some cases, a new byte-encoding scheme may be used for such semigroup. Alternatively, rather the devising an entirely new byte-encoding scheme, in one embodiment some existing byte-encoding scheme that can do two things: encode integers, and encode sequences of other objects, may be used. Abstract Syntax Notation 1 (ASN.1) can do this (or more precisely ASN.1 Basic Encoding Rules can do this). Another encoding systems is Javascript Object Notations (JSON).
In one embodiment, a matrix may be represented as a sequence of its rows. Further, a row may be represented as a sequence of entries. A bivariate polynomial in variables x and y may be represented as a sequence of y coefficients, in order of increasing degree, starting from degree zero, with each coefficient being a univariate polynomial in variable x. (But represent a zero polynomial as an empty sequence.) A univariate polynomial in x may be represented as a sequence of coefficients in ascending degree starting from degree zero, with each coefficient being an integer (and represent a zero polynomial by an empty sequence).
Suppose that a sequence of objects a, b, c is represented as [a,b,c], where each object a,b,c being replaced by its representation. Suppose integers are represented in the usual decimal form.
Consider the example a*b from Equation 13 above. Its representation is: [[[[−24],[0,64,270],[0,0,0,−720]],[[−99,0,135],[ ],[−11,0,15]]],[[[−455],[−130],[0,−504],[0,−144]],[[1089,18][ ],[121, 2]]]].
From these nested sequences and integers, a byte encoding is relatively easy. The most naïve is to just use ASCII text.
As noted above, Alice and Charlie would likely use larger parameters than the shown in the example, in order to achieve better security. So, they would use larger integers, higher-degree polynomials, and matrices with more entries. But they could still use the encoding scheme described above, even they use much larger parameters. Larger parameters do mean that Alice and Charlie must exchange a greater number of bytes.
In addition to the embodiments above using resultants, which describes a new semigroup, and the brief sketch, there are also the semigroups listed in the separate technical and research reports. Again, these various semigroups can be combined into larger semigroups. In some cases, the semigroups involve semirings.
The list below shows, by name, various such semigroups:
Consider the semiring of ideals of a standard polynomial ring. The theory of Groebner bases provides a unique representation of each ideal, in terms of its basis. Otherwise, without unique representation, Alice and Charlie might not be able to agree on the unique form of f and g.
Then addition and multiplication are straightforward: to add just take the union of the bases, and to multiply the ideals just multiply the bases. Then re-normalize the basis using Buchberger's algorithm. This give a semiring, so an additive semigroup and multiplicative semigroup. The additive semigroup is idempotent, so the wedge problem is easy. The multiplicative semigroup has a known efficient division algorithm, the idea quotient algorithm, which is not quite as efficient as the multiplication algorithm. Therefore, this semigroup is probably not suitable for direct use in key agreement.
However, the semiring maybe useful as an intermediate step of a more complicated construction. For example, it can be used as a base semiring in forming matrices, or in forming a semigroup algebra. The fact that strong subtraction in not possible in the semiring of ideals might make a known algorithm such as the Bareiss algorithm for matrix division infeasible.
Based on the above, reference is made to
The process then proceeds to block 520 in which a second building block is chosen. Again, the choice of building blocks may be done in various ways, including the functionality described above with regard to
From block 520, the process proceeds to block 530 in which the first selected building block from block 512 and the second select building block from 520 are combined. As described above, the combination can be done in a variety of ways to create a constructed semigroup which has the same or better security than the individual building blocks. The process then proceeds to block 540 and ends.
Negotiated Semigroups
In accordance with one embodiment of the present disclosure, Alice and Charlie can try to negotiate their semigroup in real time.
Specifically, due to the various well-known constructions of semigroups, including matrices, polynomials, ideals, semirings, among others, Alice and Charlie have the power to negotiate distinctly unique semigroups for each key agreement session.
Reference is now made to
For example, if the negotiation allows for very many semigroups, then this could provide for a versatile key agreement scheme. The negotiation could use data formats to describe the various constructions, for example defined in regard to the embodiment of
The negotiation could also have a “request phase”, where parties indicate to each that they request semigroups with some of the properties listed above with regard to the embodiments of
To make the handshake 610 practical, Alice and Charlie may need a mechanism to specify semigroups and their elements. For example, data structures such as the JavaScript Object Notation (JSON) might be useful for providing such specification. However, this is merely an example, and other examples of data structures are possible.
Thus, Alice and Charlie, as part of the key agreement, can choose a semigroup S from a plurality of semigroups.
After the handshaking agreement on the semigroup to be used, the process proceeds in a manner similar to that described above with regard to
A value “b” may be part of the semigroup and in one embodiment may be included within the handshaking 610. The value may, conversely, be agreed upon through other mechanisms. In the embodiment of
Next, at block 640, Alice multiplies her secret “a” with the value b to obtain d.
Similarly, at block 642, Charlie computes e equals the value b times the value c.
Subsequently, Alice provides “d” to Charlie, as shown with message 650. Similarly, Charlie provides the value “e” to Alice, shown by message 652.
Alice may then, at block 660, calculate f=ae.
Charlie may, at block 662, calculate g=dc.
Due to the associative nature of the semigroup, f=g. Therefore, Alice and Charlie have a shared secret within the negotiated semigroup.
If an adversary does not have a sufficiently reprogrammable quantum computer, then the adversary will need to build a new quantum computer to attack each key agreement session, which will make such task hard. In this situation, a multitude of users receive protection by numbers, since the attacker will only be able to attack a few of such users. Thus, the negotiation of the semigroup from many semigroups adds security and may foil the quantum attack.
Further, the use of negotiation for the semigroup allows for cryptoagility. In particular, if one semigroup is found to be vulnerable, such semigroup can be excluded from future negotiations and will therefore still permit the system to work for the remaining semigroups.
The above methods may be implemented using any computing device. One simplified diagram of a computing device is shown with regard to
In
Processor 720 is configured to execute programmable logic, which may be stored, along with data, on device 710, and shown in the example of
Alternatively, or in addition to memory 740, device 710 may access data or programmable logic from an external storage medium, for example through communications subsystem 730.
Communications subsystem 730 allows device 710 to communicate with other devices or network elements and may vary based on the type of communication being performed. Further, communications subsystem 730 may comprise a plurality of communications technologies, including any wired or wireless communications technology.
Communications between the various elements of device 710 may be through an internal bus 760 in one embodiment. However, other forms of communication are possible.
The embodiments described herein are examples of structures, systems or methods having elements corresponding to elements of the techniques of this application. This written description may enable those skilled in the art to make and use embodiments having alternative elements that likewise correspond to the elements of the techniques of this application. The intended scope of the techniques of this application thus includes other structures, systems or methods that do not differ from the techniques of this application as described herein, and further includes other structures, systems or methods with insubstantial differences from the techniques of this application as described herein.
While operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be employed. Moreover, the separation of various system components in the implementation descried above should not be understood as requiring such separation in all implementations, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Also, techniques, systems, subsystems, and methods described and illustrated in the various implementations as discrete or separate may be combined or integrated with other systems, modules, techniques, or methods. Other items shown or discussed as coupled or directly coupled or communicating with each other may be indirectly coupled or communicating through some interface, device, or intermediate component, whether electrically, mechanically, or otherwise. Other examples of changes, substitutions, and alterations are ascertainable by one skilled in the art and may be made.
While the above detailed description has shown, described, and pointed out the fundamental novel features of the disclosure as applied to various implementations, it will be understood that various omissions, substitutions, and changes in the form and details of the system illustrated may be made by those skilled in the art. In addition, the order of method steps are not implied by the order they appear in the claims.
When messages are sent to/from an electronic device, such operations may not be immediate or from the server directly. They may be synchronously or asynchronously delivered, from a server or other computing system infrastructure supporting the devices/methods/systems described herein. The foregoing steps may include, in whole or in part, synchronous/asynchronous communications to/from the device/infrastructure. Moreover, communication from the electronic device may be to one or more endpoints on a network. These endpoints may be serviced by a server, a distributed computing system, a stream processor, etc. Content Delivery Networks (CDNs) may also provide may provide communication to an electronic device. For example, rather than a typical server response, the server may also provision or indicate a data for content delivery network (CDN) to await download by the electronic device at a later time, such as a subsequent activity of electronic device. Thus, data may be sent directly from the server, or other infrastructure, such as a distributed infrastructure, or a CDN, as part of or separate from the system.
Typically, storage mediums can include any or some combination of the following: a semiconductor memory device such as a dynamic or static random access memory (a DRAM or SRAM), an erasable and programmable read-only memory (EPROM), an electrically erasable and programmable read-only memory (EEPROM) and flash memory; a magnetic disk such as a fixed, floppy and removable disk; another magnetic medium including tape; an optical medium such as a compact disk (CD) or a digital video disk (DVD); or another type of storage device. Note that the instructions discussed above can be provided on one computer-readable or machine-readable storage medium, or alternatively, can be provided on multiple computer-readable or machine-readable storage media distributed in a large system having possibly a plurality of nodes. Such computer-readable or machine-readable storage medium or media is (are) considered to be part of an article (or article of manufacture). An article or article of manufacture can refer to any manufactured single component or multiple components. The storage medium or media can be located either in the machine running the machine-readable instructions, or located at a remote site from which machine-readable instructions can be downloaded over a network for execution.
In the foregoing description, numerous details are set forth to provide an understanding of the subject disclosed herein. However, implementations may be practiced without some of these details. Other implementations may include modifications and variations from the details discussed above. It is intended that the appended claims cover such modifications and variations.
Number | Name | Date | Kind |
---|---|---|---|
5146500 | Maurer | Sep 1992 | A |
5999627 | Lee et al. | Dec 1999 | A |
8549299 | Struik | Oct 2013 | B2 |
8707042 | Schneider | Apr 2014 | B2 |
11190496 | Masny | Nov 2021 | B2 |
11601407 | Masny | Mar 2023 | B2 |
20010033656 | Gligor et al. | Oct 2001 | A1 |
20020048364 | Gligor et al. | Apr 2002 | A1 |
20030059043 | Okeya | Mar 2003 | A1 |
20040114760 | Brown | Jun 2004 | A1 |
20040158597 | Ye | Aug 2004 | A1 |
20050213758 | Lenstra | Sep 2005 | A1 |
20060029222 | Lambert | Feb 2006 | A1 |
20060036861 | Chernyak | Feb 2006 | A1 |
20080056490 | Akishita | Mar 2008 | A1 |
20080069344 | Yao | Mar 2008 | A1 |
20090006512 | Ozturk | Jan 2009 | A1 |
20090052657 | Golic | Feb 2009 | A1 |
20100020965 | Gueron | Jan 2010 | A1 |
20120221858 | Struik | Aug 2012 | A1 |
20190165936 | Brown | May 2019 | A1 |
20220231843 | Garcia Morchon | Jul 2022 | A1 |
Number | Date | Country |
---|---|---|
3080861 | Jun 2019 | CA |
1464678 | Dec 2003 | CN |
101374043 | Feb 2009 | CN |
03013052 | Feb 2003 | WO |
2012107946 | Aug 2012 | WO |
Entry |
---|
Berenstein et al., “Geometric Key Establishment”, Sep. 12, 2004, 20 pages. (Year: 2014). |
United States Patent and Trademark Office (USPTO) Office Action for U.S. Appl. No. 18/086,798 dated Oct. 5, 2023, 69 pages. |
International Searching Authority, International Search Report and Written Opinion for International Application No. PCT/CA2018/051503, dated Feb. 18, 2019. |
Berenstein, Arkady et al., “Geometric Key Establishment”, Canadian Mathematical Society conference, Dec. 9, 2004, pp. 1-19. |
Wang, Yongchuan et al., “Secret Key Sharing Scheme Based on the Theory of Algebraic Semigroups”, Journal of Electronics, Jul. 2000, vol. 17, Issue 3, pp. 238-241. |
Extended European Search report dated Aug. 14, 2020, on European Application No. 18882393.4. |
Muhammad Rabi and Alan T. Sherman, “Associative One-Way Functions: A New Paradigm for Secret-Key Agreement and Digital Signatures”, published at https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.118.6837&rep=rep1&type=pdf, Nov. 15, 1993. |
Extended European Search report dated Oct. 8, 2020, on European Application No. 21197552.9. |
Examination Report from the Indian Intellectual Property office, dated Mar. 17, 2022, for Indian Patent Application No. 202047025538. |
Extended European Search Report, EP Application No. 22150626.4; dated Jun. 28, 2022. |
Kaori Fukuda, “Box-ball systems and Robinson-Schensted-Knuth correspondence”, arxiv.org, Cornell University Library, May 28, 2001, XP080049416. |
Benjamin Smith, “Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies”, arxiv.org, Cornell University Library, Sep. 13, 2018, XP081190752. |
U.S. Appl. No. 17/175,075, “Notice of Allowance and Fee(s) Due”, dated Oct. 5, 2022. |
European Search Report, Application No. EP 22 17 6119, dated Nov. 22, 2022, pp. 1-7. |
Daniel R. L. Brown, “Plactic signatures”, International Association for Cryptologic Research, vol. 19700101:000000, Sep. 30, 2021, pp. 1-31. |
Jens Zumbrägel, “Public-Key Cryptography Based on Simple Semirings”, Dissertation, University of Zurich, Jan. 1, 2008, pp. 1-109. |
Canadian Intellectual Property Office (CIPO) Official Action and Examination Search Report for Application No. 3,146,196 dated Nov. 2, 2023, 6 pages. |
China National Intellectual Property Administration office action for Application No. 201880076818.8 dated Aug. 23, 2023. |
United States Patent and Trademark Office (USPTO) Notice of Allowance and Fee(s) Due for U.S. Appl. No. 18/086,798 mailed Jan. 17, 2024. |
Number | Date | Country | |
---|---|---|---|
20230318815 A1 | Oct 2023 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17708374 | Mar 2022 | US |
Child | 18330691 | US | |
Parent | 16836377 | Mar 2020 | US |
Child | 17708374 | US | |
Parent | 15824398 | Nov 2017 | US |
Child | 16836377 | US |