Abstract :
Diffie and Hellman (1976) proposed to use exponentiation module a prime for constructing the key generation system. A security of this system is based on the supposed hardness of the following problem (A): given ηx and ηy compute ηxy. Sidelnikov, Cherepniov, and Yaschenko (1993) considered a system based on the noncommutative group G. We assume that G is a certain subgroup of the group GLn(Fp) of n×n matrices over the finite field Fp. We consider the representation of the group GLn(Fp) with the aid of exponentiation in a subsidiary cyclic group U of order p and investigate of the security of the resulting key generation systems. The group of Fq-rational point on elliptic curve and the subgroup U=⟨η⟩ of the multiplicative group of the subsidiary finite field Fq, where p|q-1, η∈Fq, ηp =1, η≠1, are the examples of the group U. We consider the group 𝒰 of affine transformations of the field Fp which is isomorphic to a certain subgroup of GL2(Fp). In this case the security of the key generation system under certain conjecture (which simplifies the task of adversary) is based on the hardness of the following problem (B): given ηx,ηy,βz compute ηxyz/. It seems impossible reduce this problem to several Diffie-Hellman problems (A). The system being considered uses a universal key, which does not exist in the Diffie-Hellman system and is presumably a new element for key generation systems. The knowledge of k is supposed to be a necessary condition to compute the private key
Keywords :
cryptography; group theory; matrix algebra; cyclic group; elliptic curve; exponentiation module; exponentiation-based key generation; finite field; matrices; multiplicative group; necessary condition; noncommutative group; noncommutative groups; private key; system security; universal key; Elliptic curves; Galois fields; Public key; Security;