=Paper=
{{Paper
|id=Vol-3188/short7
|storemode=property
|title=Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper)
|pdfUrl=https://ceur-ws.org/Vol-3188/short7.pdf
|volume=Vol-3188
|authors=Vasyl Ustimenko,Oleksandr Pustovit
|dblpUrl=https://dblp.org/rec/conf/cpits/UstimenkoP21a
}}
==Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms (short paper)==
On Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms Vasyl Ustimenko1,2 and Oleksandr Pustovit2 1 University of Marie Curie-Sklodowska in Lublin, 5 Plac Marii Curie-Skłodowskiej, Lublin, 20-031, Poland 2 Institute of Telecommunications and the Global Information Space, 13 Chokolivsky bul., Kyiv, 02000, Ukraine Abstract The paper is dedicated to applications of Noncomutative Cryptography to access control algorithms for Information Systems. The example of usage of the protocol based on multivariate transformations to access control tasks is given. The platforms for such protocols are subsemigroups of affine Cremona semigroup acting on affine space of dimension n with Multicomposition property, i.e. ability to make computation of the composition of n elements from subsemigroup in polynomial time T(n).The implementation of the algorithm is given in the case of platform of Eulerian transformations. The modification of main algorithm is based on the idea of combination of Eulerian Transformations with elements of affine Cremona group of bounded degree and polynomial density. Keywords 1 Access control, noncommutative cryptography, multivariate cryptography, multicomposition property, Eulerian transformations, one-time pad. 1. Introduction Protocol based approach to control access to information systems in information space is a very popular one. With the appearance of the first samples of quantum computers it is very important to investigate potential of this approach. We study new postquantum resistant multivariate protocols which can substitute unresistable to quantum computer based attacks Diffie-Hellman algorithm. Current state of research in Postquantum Multivariate Cryptography is presented on the web page of the future Satellite Conference “Mathematical Aspects of Post Quantum Cryptography” of the Mathematical Congress 2022 (see https://icm2022.org/satellites). One of the sixth main directions of the Post Quantum Cryptography is Multivariate Cryptography for which affine Cremona semigroup named after Luigi Cremona [1] and its multivariate transformations are the main instruments to create cryptographical algorithms. These transformations are induced by endomorphisms of polynomial ring K[ x1 , x 2 ,..., x n ] over commutative ring K. The case K=Fq of finite field is very popular in classical Multivariate Cryptography. We discover large subgroups of CSn(K), n=2,3,… with the Multicomposition property (MCP) which means possibility to compute the composition of N arbitrary chosen elements of CSn(K) in polynomial time T(n). We assume that each element of CSn(K) is given in its standard polynomial form xi f i ( x1 , x 2 ,..., x n ), i=1,2,…n. 2. On Multivariate Protocols of Noncommutative CRYPTOGRAPHY and Access Control Tahoma protocol was introduced in [2]. It uses two semigroups Sn2. 6. Conclusion The paper gives an example of application of protocols of Noncommutative Cryptography (see [10–23]) to the problems of Access Control for Information Systems. The general scheme can be the following one. Alice and Bob use protocol based on the input (IAS) and output algebraic systems (OAS) given by some generators a1, a2,…, an and b1, b2, …, bm respectively. Correspondents elaborate in a secure way some elements c1, c2,…, ct which generates the special subsystem (RIS) of OIS. They take element w=w(c1, c2,…,ct) which is known function from hidden generators ci. Finally they use some ‘’deformation rule” d to form entrance password d(w) for some Information System IS. 254 For the selection of appropriate protocol recent cryptanalytical results [24–26] can be used. Flexibility of the method allows generalization for the case of multiuser mode. Descriptions of cryptographical problems in access control technology and alternative solutions reader can find in [27, 28]. 7. References [1] Max Noether, Luigi Cremona, Mathematische Annalen 59, 1904, 1–19. [2] V. Ustimenko, On new symbolic key exchange protocols and cryptosystems based on hidden tame homomorphism, Dopovidi NAS of Ukraine, no 10, 26–36, 2018. [3] V. Ustimenko, M. Klisowski, On Noncommutative Cryptography with cubical multivariate maps of predictable density, in: Intelligent Computing, Proceedings of the 2019 Computing Conference, Volume 2, Part of Advances in Intelligent Systems and Computing (AISC, volume 998), pp. 654-674. [4] V. Ustimenko, M. Klisowski, On Noncommutative Cryptography and homomorphism of stable cubical multivariate transformation groups of infinite dimensional affine spaces, Cryptology ePrint Archive, 593, 2019. [5] V. Ustimenko, On the usage of postquantum protocols defined in terms of transformation semigroups and their homomophisms, Theoretical and Applied Cybersecurity, National Technical University of Ukraine "Igor Sikorsky Kiev Polytechnic Institute", vol. 1, no. 2, 32–44, 2020. [6] V. Ustimenko, On new multivariate cryptosystems based on hidden Eulerian equations, Reports of Nath. Acad of Sci, Ukraine, 5, 17-24, 2017. [7] V. Ustimenko, On new multivariate cryptosystems based on hidden Eulerian equations over finite fields, ePrint Archive, 093, 2017. [8] V. Ustimenko, On semigroups of multiplicative Cremona transformations and new solutions of Post Quantum Cryptography, IACR Cryptol, ePrint Arch, 133, 2019. [9] V. Ustimenko, O. Pustovit, New Cryptosystems of Noncommutative Cryptography based on Eulerian Semigroups of Multivariate Transformations, CPITS 2021, 18-26. [10] D. N. Moldovyan, N. A. Moldovyan, A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols, International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010: Computer Network Security pp 183-194. [11] L. Sakalauskas, P. Tvarijonas, A. Raulynaitis, Key Agreement Protocol (KAP) Using Conjugacy and Discrete Logarithm Problem in Group Representation Level, INFORMATICA, 2007, vol. 18, No 1, 115-124. [12] V. Shpilrain, A. Ushakov, The conjugacy search problem in public key cryptography: unnecessary and insufficient,Applicable Algebra in Engineering, Communication and Computing, August 2006, vol. 17, iss. 3–4, 285–289. [13] Delaram Kahrobaei, Bilal Khan, A non-commutative generalization of ElGamal key exchange using polycyclic groups, In IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference [4150920] https://doi.org/10.1109/GLOCOM.2006.lications [14] A. Myasnikov, V. Shpilrain, A. Ushakov, Group-based Cryptography. Berlin: Birkhäuser Verlag, 2008. [15] A. G. Myasnikov; Vladimir Shpilrain and Alexander Ush akov (2011), Noncommutative Cryptography and Complexity of Group-theoretic Problems, American Mathematical Society [16] Zhenfu Cao (2012). New Directions of Modern Cryptography. Boca Raton: CRC Press, Taylor & Francis Group. ISBN 978-1-4665-0140-9. [17] G. Maze, C. Monico, J. Rosenthal, Public key cryptography based on semigroup actions. Adv. Math. Commun. 1(4), 489–507, 2007. [18] P. H. Kropholler, et al., Properties of certain semigroups and their potential as platforms for cryptosystems, Semigroup Forum, 81: 172–186, 2010. [19] J. A. Lopez Ramos, et al., Group key management based on semigroup actions, Journal of Algebra and its applications, vol. 16(08):1750148, 2017. 255 [20] G. Kumar, H. Saini, Novel Noncommutative Cryptography Scheme Using Extra Special Group, Security and Communication Networks ,Volume 2017, Article ID 9036382, 21 pages, https://doi.org/10.1155/2017/9036382. [21] A. Bessalov, et al., Analysis of 2-isogeny properties of generalized form Edwards curves, in: Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, July 7, 2020, vol. 2746, pp. 1–13. [22] A. Bessalov, V. Sokolov, P. Skladannyi, Modeling of 3- and 5-isogenies of supersingular Edwards curves, in: Proceedings of the 2nd International Workshop on Modern Machine Learning Technologies and Data Science, June 2–3, 2020, no. I, vol. 2631, pp. 30–39. [23] A. Bessalov, et al., Computing of odd degree isogenies on supersingular twisted edwards curves, in: Proceedings of the Workshop on Cybersecurity Providing in Information and Telecommunication Systems, January 28, 2021 vol. 2923, 1–11. [24] V. Roman'kov, An improved version of the AAG cryptographic protocol, Groups, Complex., Cryptol, 11, No. 1 (2019), 35-42. [25] A. Ben-Zvi, A. Kalka, B. Tsaban, Cryptanalysis via algebraic span, in: Shacham H. and Boldyreva A. (eds.) Advances in Cryptology, CRYPTO 2018. 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I, Vol. 10991, 255{274, Springer, Cham (2018). [26] B. Tsaban, Polynomial-time solutions of computational problems in noncommutative-algebraic cryptography, J. Cryptol., 28, no. 3, 601-622, 2015. [27] S. Contiu, et al., IBBE-SGX: cryptographic group access control using trusted execution environments. In 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018, 207–218, 2018.2222 [28] J. Kim, S. Nepal, A Cryptographically Enforced Access Control with a Flexible User Revocation on Untrusted Cloud Storage Data Science and Engineering, vol. 1, 149–160 (2016) 256