Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra (Q2032302)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
scientific article

    Statements

    Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra (English)
    0 references
    0 references
    11 June 2021
    0 references
    The design of cryptosystems and cryptographic protocols using as primitives some hard problems in non-commutative group theory is one of the ways to construct schemes secure against the (supposed) next arrival of the quantum computation. Following this way the present paper proposes three cryptographic key exchange protocols based on the non-associative octonion algebra \(\mathcal{O}\),\, see [\textit{J. H. Conway} and \textit{D. A. Smith}, On quaternions and octonions: their geometry, arithmetic, and symmetry. Natick, MA: A K Peters (2003; Zbl 1098.17001)]. The properties and the arithmetic of \(\mathcal{O}\)\, are summarized in Section 1.\par The first proposed scheme (Section 2) is the translation of the public-key cryptosystem RSA to the octonion setting. Giving the totient function \(\lambda(k,m)\),\, with \(k\in \mathcal{O}\)\, an integral octonion and \(m\)\, a natural number product of two primes \(p\), \(q\)\, one randomly takes \(e\)\, coprime to \(\lambda(k,m)\)\, (the public key) and \(d= e^{-1} \bmod \lambda(k,m)\)\, (the private key). The security of the scheme is based both on the difficulty of the factorization of \(m\)\, and on the difficulty of the computation of \(\lambda(k,p)\)\, and \(\lambda(k,q)\).\par The two other proposals are symmetric key exchange protocols. Section 3 first provides a key exchange algorithm in a quaternion subalgebra \(D\subset \mathcal{O}\)\, and then with two such keys generates an octonion key, which is an automorphism of \(\mathcal{O}\).\par Finally Section 4 shows the second symmetric key exchange algorithm based on a derivation of \(\mathcal{O}\).
    0 references
    non-associative cryptography
    0 references
    octonion cryptography
    0 references
    totient function
    0 references
    octonion RSA algorithm
    0 references
    quaternion cryptography
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references