Efficient quantum algorithms to break group ring cryptosystems

被引:0
|
作者
Dooms, Ann [1 ]
Emerencia, Carlo [1 ]
机构
[1] Vrije Univ Brussel, Dept Math & Data Sci, Pl laan 2, B-1050 Brussels, Belgium
关键词
Public-key cryptography; Post-quantum security; Group ring cryptosystems;
D O I
10.1016/j.jisa.2024.103923
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of widely-used public-key cryptographic protocols like RSA, Diffie-Hellman key exchange and the Digital Signature Algorithm (DSA) is under threat due to the emergence of quantum computers. Shor's groundbreaking quantum algorithm poses a significant risk by efficiently factoring large integers into their prime factors, compromising RSA security. Additionally, it solves the Discrete Logarithm Problem, impacting certain Diffie-Hellman-based cryptosystems and digital signatures. Given this, it is imperative to enhance our current cryptographic tools for the post-quantum era, aiming to make it impractical, even with quantum algorithms, to breach the security of new cryptosystems. Prominent alternatives include elliptic curve and lattice-based cryptography, with exploration into other algebraic systems featuring difficult problems to ensure security. This paper establishes that systems based on the difficulty of inverting group ring elements are not quantum-resistant.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Efficient algorithms for elliptic curve cryptosystems
    Guajardo, J
    Paar, C
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 342 - 356
  • [2] EFFICIENT ALGORITHMS FOR THE CONSTRUCTION OF HYPERELLIPTIC CRYPTOSYSTEMS
    OKAMOTO, T
    SAKURAI, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1992, 576 : 267 - 278
  • [3] Efficient algorithms for pairing-based cryptosystems
    Barreto, PSLM
    Kim, HY
    Lynn, B
    Scott, M
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 354 - 368
  • [4] Group ring based public key cryptosystems
    Mittal, Gaurav
    Kumar, Sunil
    Narain, Shiv
    Kumar, Sandeep
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06): : 1683 - 1704
  • [5] A quantum algorithm using NMR computers to break secret-key cryptosystems
    Kazuo Ohta
    Tetsuro Nishino
    Seiya Okubo
    Noboru Kunihiro
    New Generation Computing, 2003, 21 : 347 - 361
  • [6] Efficient algorithms for speeding up the computations of elliptic curve cryptosystems
    Tsaur, WJ
    Chou, CH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (02) : 1045 - 1064
  • [7] A quantum algorithm using NMR computers to break secret-key cryptosystems
    Ohta, K
    Nishino, T
    Okubo, S
    Kunihiro, N
    NEW GENERATION COMPUTING, 2003, 21 (04) : 347 - 361
  • [8] A secure key authentication scheme for cryptosystems based on DLP in group ring
    Kumar, Sandeep
    Mittal, Gaurav
    Kumar, Sunil
    ANNALES MATHEMATICAE ET INFORMATICAE, 2024, 60 : 75 - 92
  • [9] Efficient Quantum Algorithms
    Klappenecker, Andreas
    Roetteler, Martin
    IT-INFORMATION TECHNOLOGY, 2006, 48 (06): : 344 - 353
  • [10] AN EFFICIENT ALGORITHM FOR CONSTRUCTING A CRYPTOSYSTEM WHICH IS HARDER TO BREAK THAN 2 OTHER CRYPTOSYSTEMS
    ASMUTH, CA
    BLAKLEY, GR
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1981, 7 (06) : 447 - 450