=Paper=
{{Paper
|id=Vol-3288/short6
|storemode=property
|title=On-Time Dependent Linguistic Graphs and Solutions of Postquantum Multivariate Cryptography (short paper)
|pdfUrl=https://ceur-ws.org/Vol-3288/short6.pdf
|volume=Vol-3288
|authors=Vasyl Ustimenko,Oleksandr Pustovit
|dblpUrl=https://dblp.org/rec/conf/cpits/UstimenkoP22
}}
==On-Time Dependent Linguistic Graphs and Solutions of Postquantum Multivariate Cryptography (short paper)==
On-Time Dependent Linguistic Graphs and Solutions of Postquantum Multivariate Cryptography Vasyl Ustimenko1,2 and Oleksandr Pustovit2 1 University of Royal Holloway in London, Egham Hill, Egham TW20 0EX, United Kingdom 2 Institute of Telecommunications and the Global Information Space of the National Academy of Sciences of Ukraine, 13 Chokolivsky boul., Kyiv, 02000, Ukraine Abstract Time dependent linguistic graphs over abelian group H are introduced. Subsemigroups of such endomorphisms together with their special homomorphic images are used as platforms of cryptographic protocols of noncommutative cryptography. The security of these protocol is evaluated via complexity of hard problem of decomposition of Eulerian transformation into the product of known generators of the semigroup. Nowadays the problem is intractable one in the Postquantum setting. The symbiotic combination of such protocols with special graph based stream ciphers working with plaintext space of kind Km where m = nt for arbitrarily chosen positive parameter t is proposed. This way we obtained a cryptosystem with encryption/decryption procedure of complexity O(m1+2/t). Keywords 1 Post quantum cryptography, computer algebra, affine Cremona semigroup, Eulerian transformations, linguistic graphs, commutative rings. 1. Introduction evaluating proposed public key algorithms. Asymmetrical Cryptography is largely based on theoretical complexity assumptions. Fundamental Theoretical danger of quantum computers to question whether or not P = NP have been open Information Security has been known since 1994. for decades. This assumption is connected with In the case of asymmetrical cryptography it fundamental conjecture of cryptography that there affects both protocol based cryptosystems for are no polynomial-time algorithms for solving which encryption tools are not given to public and any NP-hard problem. public key cryptosystems. Such theoretical danger to Cryptography For instance, a symbiotic combination of increase interest to problems that are hard to solve Diffie -Hellman protocol (DH) with one time pad in the quantum setting. Noteworthy that many of encryption or El Gamal cryptosystem in terms of the fundamental problems about polynomial time DH algorithm will not be safe in Postquantum era problems have analogs at the level of because discrete logarithm problem is not computability. Many NP-hard problems have quantum resistant. Popular RSA public key analogs over various algebraic and combinatorial cryptosystem is not quantum secure because structures. Techniques from computational or factorisation problem can be solved in polynomial statistical algebra afford insights into the time with the usage of quantum computer. distribution of hard instances. Nowadays this vulnerability is not only Post Quantum Cryptography is divided into theoretical because large corporations like IBM, the following major areas: Code-based Google, governmental scientific centers in cryptography, Lattice-based cryptography, Europe, China, UK, Jappan and USA began to Multivariate cryptography. Hash functions base build working quantum computers. cryptography, Supersingular elliptic curve That is why NSA has advised researchers to isogeny cryptography, Noncommutative work on new security products, NIST and ETSI Cryptography. This paper is dedicated to a new are currently investigating relevant standards and CPITS-2022: Cybersecurity Providing in Information and Telecommunication Systems, October 13, 2022, Kyiv, Ukraine EMAIL: vasulustimenko@yahoo.pl (V. Ustimenko); sanyk_set@ukr.net (O. Pustovit) ORCID: 0000-0002-2138-2357 (V. Ustimenko); 0000-0002-3232-1787 (O. Pustovit) ©️ 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 96 branch of Multivariate Cryptography (MC) transformation of Classical Multivariate dealing with polynomial transformations of affine Cryptography we can work with several spaces over various commutative rings of polynomial maps. It allows to construct protocols unbounded degree and large semigroups or which security rests on difficult problem to groups of such transformations. decompose multivariate map into composition of Multivariate cryptography is usually defined several given generators. If the map and as the set of cryptographic schemes using the generators are given in a standard form of computational hardness of the Polynomial System Multivariate Cryptography then the Solving problem over a finite field. Solving decomposition task is intractable problem of Post systems of multivariate polynomial equations is Quantum Cryptography. In fact we work in the proven to be NP-hard or NP-complete. That is area of intersection of MC with the why those schemes are often considered to be Noncommutative Cryptography which uses good candidates for post-quantum cryptography. complexity of problems from Noncommutative Classical Multivariate Cryptography uses systems algebra on groups, semigroups, algebras and other of quadratic (rarely cubic) equations. The idea to algebraic systems [4–21], recently interesting use degree 2 is motivated by possibility to cryptanalytic results have been obtained in this transform system of equations of any constant area [22, 23]. degree to equivalent quadratic system of large The output of the protocol can be used for safe size. Some weakness of this argument is caused creation of multivariate encryption map or safe by the fact that such transformation can seriously delivery of such map from one correspondent to affect the complexity of system. another [6, 24]. This approach can be also used for The first quadratic multivariate scheme based the construction of digital signatures [6]. Note that on multivariate equations was introduced by protocol based multivariate algorithms essentially Matsumoto and Imai in 1988. These authors not differs from traditional for MC public keys. The only introduced a multivariate scheme but in fact speed of execution of protocols eseentially differs a general principle to design public-key in the cases of different platforms. In this paper, cryptosystems using multivariate equations. we continue to use algebraic graphs for the There are now plenty of proposals based on this construction of multivariate transformations. We principle that are attractive because they offer the select the case of most efficient (O(n3)) case of possibility to have very short asymmetric Eulerian transformations [25, 26], and suggest signatures that require only a small amount of faster algorithm of generation initial data resources on embedded devices [1–3]. After an constructed in terms of algebraic graphs theory. intense period of cryptanalysis, few schemes We convert the protocol based on Eulerian emerged as the most robust solutions: HFE transformations of affine space Kn to the (Hidden Field Equations) and UOV (Unbalanced cryptosystem of El Gamal type which work with Oil and Vinegar), both developed by J. Patarin in potentially infinite tuples of characters of the late 1990’s. Variants of these schemes have elements from commutative ring K. In fact, the been submitted to the post-quantum dimension of plaintext space is m = O(nt) where standardization process for public key algorithms parameter t is more 1. The symmetric encryption as encryption tools or digital signature algorithm has complexity O(m1+2/t). So, it is instruments organized by NIST. For the third possible to work with the large files. We hope that round of this competition in July 2020 NIST does this postquantum cryptosystem can be used not select multivariate algorithm in the category instead of symbiotic combination of classical of encryption instruments. Remaining Diffie-Hellman algorithm and one time pad. Unbalanced Oil and Vinegar Rainbow system is In Section 2 we define affine Cremona group investigated as possible digital signature tool. and affine Cremona semigroup over general We believe in the capacity of Multivariate commutative ring K which are central objects of Cryptography (MC) in wide sense as a source of Multivariate Cryptography and Theory of encryption cryptosystems. Recent constructions Symbolic Computations. Additionally, we of families of semigroups and groups of introduce Eulerian semigroup ESn(K) and group transformation of affine spaces Kn with possibility EGn(K) via endomorphism of K[x1, x2, …, xn] of computation of n elements from the semigroup moving generic variable xi into monomial term. in polynomial time gives opportunity to use We define invertable Jordan-Gauss methods of Semigroup based cryptography in transformations of EGn(K) as triangular multivariate settings. So instead of one nonlinear transformation of (K*)n with obvious procedure of 97 reimage computation. Semigroup EGn(K) satisfies Symbol End(K[x1, x2,…, xn]) = En(K) stands for to multiple composition property (MCP), which semigroup of all endomorphisms of K[x1, x2,…, means ability to compute the composition of n xn]. So we can identify F and the formal rule x1 elements in polynomial time. Other subgroups of →f1(x1, x2,…, xn), x2 →f2(x1, x2,…, xn),…, xn affine Cremona group with MCP can be →fn(x1, x2,…, xn) where fi ϵ K[x1, x2,…, xn]. constructed as stable subgroups formed by Element F naturally induces the transformation elements with maximal degree d, where d is ∆(F) of affine space Kn given by the following rule constant [27, 28]. Other classes of subsemigroups ∆(F):(α1, α2,…, αn) → (f1(α 1, α2,…, αn), f2(α 1, of ESn(K) can be defined via the concept of α2,…, αn),…, f1(α 1, α2,…, αn)) for each (α1, α2,…, linguistic graph over abelian group G in the case αn) ϵ Kn. Luigi Cremona [29] introduced ∆(En(K)) G = K* and more general concept of a time =CS(Kn) which is currently called affine Cremona dependent linguistic graph of type (s, r,m) which semigroup. A group of all invertible is simply a tuple of linguistic graphs of this type. transformations from CS(Kn) with an inverse from We introduce semigroups sSTr(K*) of tuples of CS(Kn) is known as affine Cremona group CG(Kn) multivariate maps (elements of Cartesian powers (shortly Cremona group, see, for instance [30]). ES1(K) in the case of G = K* and l = r = s) named We refer to infinite En(K) as formal affine as semigroups of symbolic strings. These Cremona semigroup. Density of the map Fi is the semigroups are used for the constriction of maximal number of monomial terms in fi, i = 1, semigroup s,rSWm(K*) of symbolic walks on time 2,…, n. dependent linguistic graphs. Effectively Let K be a finite commutative ring with the computable homomorphism s,rSWm(K*) → unity such that multiplicative group K* of regular ESn(K), n = m + s is presented there. Its image is elements of this ring contains at least 2 elements. a special subsemigroup of ESn(K). This We take Cartesian power (K*)n and consider an homomorphism and the concept of Jordan- Gauss Eulerian semigroup ESn(K) of transformations of transformation allows to define Eulerian kind transformations with inverting accelerator. It can x1→μ1x1a(1,1)x2a(1,2)…xna(1,n), be used as instrument for the development of x2→μ2x1a(2,1)x2a(2,2)…xna(2,n), public keys algorithms. Section 3 presents the … concept of homomorphisms of time dependent xn→μnx1a(n,1)x2a(n,2)…xna(n,n), linguistic graphs over K*. Such graph where a(i, j) are elements of arithmetic ring Zd, d homomorphism induces homomorphism of = |K*|, μi ϵ K*. corresponding subsemigroups of Eulerian Let EGn(K) stand for Eulerian group of transformations. The description of Tahoma invertible transformations from ESn(K).It is easy protocol in terms of time dependent graph over K* to see that the group Mn of monomial linear and its quotients is also presented there. This transformations of kind xi → μixπ(i), i = 1, 2,…, n, section also contains examples of sparse families where μi ϵ K*and π is a permutation on {1,2,…,n}, of time dependent graphs. They can be used for is a subgroup of EGn(K). So, semigroup ESn(K) is the faster generation of data for the protocol by a highly noncommutative algebraic system. Each Alice (creator of protocols data). Finally we element from ESn(K) can be considered as present a brief description of symbiotic transformation of a free module Kn. combination of the protocol and graph based Let π and σ be two permutations on the set stream cipher working with potentially infinite {1,2,…,n}. plaintext space [31]. We define transformation JGA,m(π, σ) which sends (x1, x2,…, xn) into (y1, y2,…, yn) defined by 2. On Affine Cremona Semigroups triangular matrix A = (a(i; j)) with integer entries a(i,j)as a totality of monomial terms generalisations with injective maps of Kn into Kn with coefficients from G of kind gx1a(1)x2a(2)… in cryptography was used in [27] (K = Zm) and xna(n), where a(i), i = 1, 2,…, n are elements of Zd, [32] (K = Fq). We say that g is a tame Eulerian d = |G|. We introduce sBs(G) as (G < x1, x2,…, xs element over K if it is a composition of several >)s and rBs as G(< x1, x2,…, xs >)r. Element (f1, Jordan - Gauss multiplicative maps over f2,…, fs) from sBs(G) can be identified with the commutative ring K. It is clear that it sends endomorphism x1 → f1, x2 → f2,…, xs → fs of G < variable xi to a certain monomial term. The x1, x2,…, xs > as a group with the operation given decomposition of g into product of Jordan - - via the following rule Gauss transformation allows us to find the gx1a(1)x2a(2)…xsa(s)×hx1b(1)x2b(2)…xsb(s)=ghx1a(1)+b(1)x reimage of this transformation of (K*)n 2 a(2)+b(2) …xsa(s)+b(s). So, tame Eulerian transformations over K are We assume that G = K* for the commutative special elements of EGn(K). We refer to elements ring K. Endomorphism H ϵ ESs(K) acts naturally of ESn(K) as multiplicative Cremona elements. on rBSs(K*). The result of action of H on G from r Assume that the order of K is a constant. As it BSs(K*) will be written as G(H) or simply GH. follows from the definition the computation of the We consider the concept of time dependent value of element from ESn(K) on the given linguistic graph over commutative group K*. element of Kn is estimated by O(n2). The product Let Ls,r,m(K*) = L(K*) be variety of all of two multiplicative Cremona elements can be linguistic graphs of type (s, r, m) over K*. computed in time O(n3). F(Ls,r,m(K*)) = F(L(K*)) stands for the free Similarly to the case of commutative ring (see semigroup over the alphabet L(K*). We interpret [28]) we introduce a linguistic graph I = Г(G) over word (I(1), I(2),…, I(l)) = F(L) as time dependent finite abelian group G defined as bipartite graph linguistic graph It(K*) on interval [1; l] and refer with a point set P = Ps,m = Gs+m and a line set L = to j of I(j) as time parameter. We think that there Lr,m = Gr+m as linguistic incidence structure I=Is,r,m is a function, given by some Oracle, which if point x = (x1, x2,…, xs, xs+1, xs+2,…, xs+m) is establishes coefficients qi = qi(t) from K*, a(i, j) incident to line y = [y1, y2,…, yr, yr+1, yr+2,…,yr+m] = a(i, j)(t) from Zd, i = 1, 2,…, m, j =1, 2,…, m. if and only if the following relations hold Product of (I(1), I(2),…, I(l)) with (I’(1), I’(2),…, xs+1a(1)yr+1b(1)=q1w1(x1, x2,…, xs, y1, y2,…, yr) I’(p)) is time dependent graph (shortly t.d.g.) xs+2a(2)yr+2b(2)=q2w2(x1, x2,…, xs+1, y1, y2,…, yr+1) (I(1), I(2),…, I(l), I(l+1); I’(l+2),…, I’(l+p)). … Let us define special subsemigroup sSTr(K*). xs+ma(m)yr+1b(m)=qmwm(x1, x2,…, xs+m-1, y1, y2,…, We consider totality sSTr(K*) of tuples of kind tu yr+m-1) = u = (H1, G1, G2, H2, H3, G3, G4, H4,…, H2t-1, G2t- where qj, j = 1, 2,…, m are elements of G, wi are 1, G2t, H2t, H0) where Hi and Gi are elements of s words in characters xi and yj from G and Bs(G) and rBs(G) respectively of various rank t, t parameters a(i), b(i) are mutually prime with d = ≥0. We refer to such tuple tu as symbolic strings |G|. Brackets and parenthesis allow us to of type (s; r) and rank t = r(u). distinguish points from lines similarly to the case We define a product of u = (H1, G1, G2, H2, H3, of linguistic graphs over commutative rings. G3, G4, H4,…, H2t-1, G2t-1, G2t, H2t, H0) and ~ ~ ~ ~ ~ ~ ~ We define colours ρ((p)) and ρ([l]) of the point v ( H1 , G1 , G 2 , H 2 , H 3 , G3 , G 4 , ~ ~ ~ ~ ~ ~ (p) and the line [l] as the tuple of their first H 4 ,..., H 2 k 1G 2 k 1 , G 2 k , H 2 k , H 0 ) coordinates of kind a = (p1, p2,…, ps) or a = (l1, as l2,…, lr) and introduce well defined operator N(v; w u ( H 1 , G1 , G 2 , H 2 , H 3 , G3 , G 4 , H 4 ,..., a) of computing the neighbour of vertex v of ~ ~ ~ H 2t 1 , G 2t 1 , G 2t , H 2t , H 1 H 0 , G1 H 0 , G 2 H 0 , colour a ϵ Gs or a ϵ Gr. Similarly to the case of ~ ~ ~ ~ ~ H 2 H 0 , H 3 H 0 , G3 H 0 , G 4 H 0 , H 4 H 0 ,..., linguistic graph over commutative ring we define ~ ~ ~ ~ ~ H 2 k 1 H 0 , G 2 k 1 H 0 , G 2 k H 0 , H 2 k H 0 , H 0 H 0 ) colour jump operator J(p, a), a ϵ Gs on partition So, r(w) = r(u) + r(v). set P and J(l, a), a ϵ Gr on partition set L by It is easy to see that this products converts conditions J(p, a) =(a1, a2,…, as, p1+s, p2+s,…, ps+n) s STr(K*) into a semigroup. The totality of and J(l, a)=[a1, a2,…, ar, l1+r, l2+r,…, lr+m]. symbolic strings of length 1 forms subsemigroup If G’ > G then we can consider graph I(G’) of which is isomorphic to ESs(K). The unity of type (r, s, m) with partition sets P’=(G’)m+s and L’ = (G’)m+r given by the same equations with qi 99 s STr(K*) is (H0) where H0 is the unity of transition of time dependent linguistic graph It semigroup ESs(K) with symbolic trace u. Let us consider the pair (tu, It) such that ut is Let s,rGWm(K*) be subsemigroup of s,rSWm(K*) element of sSTr(K*) of rank t and It ϵ F(Lr,s,m(K)) formed by pairs (tu, It) for which tu = u is a of length t. symbolic strings of kind (H1, G1, G2, H2, H3, G3, Selected time dependent linguistic graph I = It G4, H4,…, H2t-1, G2t-1, G2t, H2t, H0) where H0 is an from Ls,r,m(K*) defined on the interval [1, t]. Let element of EGn(K). us expand K* for R = K* < x1,x2,…, xs+m >. This Lemma 2.2. The map η induces change instantly converts t.d.g. It = (I(1), I(2),…, homomorphism ~ of s,rGWm(K*) into EGs+m(K). I(t)) into I’t =(I’(1), I’(2),…, I’(t)) from We refer to ~( s , r GWm ( K *)) s , r Gm ( K *) as F(Ls,r,m(R)). It is easy to see that this products chain transition group of type (s, r,m). converts sSTr(K*) into a semigroup. The totality of Assume that ~(t u, It ) F is written in its symbolic strings of length 1 forms subsemigroup which is isomorphic to ESs(K). The unity of standard form, s = O(1) and r = O(1). The s STr(K*) is (H0) where H0 is the unity of knowledge of some reimage ~ of kind (tu, It) and ~ -1 semigroup ESs(K). H 0 ( H 0 ) 1 allow us to compute F (y) in We will construct time dependent walk W(tu, given y in time O(tn2). It) with colour jumps in the I’t(R) which starts in In fact we can form the reverse string the graph I(1) with selection of initial point v0 = ~ ~ ~ ~ v ( H 2t H 0 , G 2t H 0 , G 2t 1 H 0 , H 2t 1 H 0 , (x1, x2,…, xs+m) from Rs+m. Further construction of ~ ~ ~ ~ H 2t 2 H 0 , G 2t 2 H 0 , G 2t 3 H 0 , H 2t 3 H 0 ,..., the walk is prescribed by symbolic string u. ~ ~ ~ ~ ~ H 2 H 0 , G 2 H 0 , G1 H 0 , H 1 H 0 , H 0 ) During initial time interval (0; 1] we have to and check that compute J(v0;H1) =v1, N(v1,G1) = v2, J(v2;G2) = v3 ~ ~ ( u , I t ) ( v, I t ), ( I t ) ( I (t ), I (t 1),..., I (1) t t is and N(v3;H2) = v4 in the graph I’(1). Doing these an identity map. computations we use only multiplication of K* < Let us consider the data D consisting of x1, x2,…, xs+m >. symbolic walk (tu, It), where It is time dependent Next step corresponds to time interval (1; 2]. graph of type (s, r,m), element tu of sGTr(K*), and We treat the output v4 of computations within two lists of Jordan - Gauss generators of EGs+m(K) interval (0; 1] as point of the graph I’(2). formed by G1, G2,…, Gt(1) and F1, F2,…, Ft(2) with Now we compute J(v4,H3) = v5, N(v5,G3) = v6, t(1) ≥ 1, t(2) ≥ 1. We say that element F J(v6,G4) = v7 and N(v7;H4) = v8 in the graph I’(2). =G1G2…Gt(1)η(tu, It)F1F2,…,Ft(2) written in its Continuation of this process subdivided into t standard form has inverting accelerator D. steps to the last four vertexes of graph I’(t) given Noteworthy that knowledge of D allows us to find by the list J(v4t-4,H2t-1) = v4t-3, N(v4t-3,G2t-1) = v4t-2, F-1 in its standard form in polynomial time in J(v4t-2,G2t) = v4t-1 and N(v4t-1,H2t) = v4t. variable n = m + s. Pairs of kind (F,D) can be used Finally, we compute v4t+1 = J(v4t,H0) from instead of products of Jordan - Gauss elements for s Bs(R) in the graph I’(t). Noteworthy that output the constructions of public key cryptosystems v4t+1 is a tuple (1H0,2H0,…,sH0, Fs+1, Fs+2,…, Fs+m) introduced in [27, 31]. where H0 = (1H0, 2H0,…, sH0), Fj are elements of K* < x1, x2,…, xs+m >. The walk W(tu, It) defines the map η(tu; It) =s,rηm given by the rule x1 → 1H0, 3. Special Homomomrphisms x2 →2H0,…, xs →sH0, xs+1 → Fs+1, xs+2 → Fs+2,…, of Time Dependent Graphs xs+m → Fs+m from Es+m(K). Let us consider these maps in formal way. We consider a direct product and Protocols of Noncommutative s,r Dm(K*) of sSTr(K*) and F(Lr,s,m(K*)) and its Cryptography subdirect product s,rSWm(K*) formed by elements of kind (tu, It). Let us consider time dependent linguistic Lemma 2.1. The η =s,r ηm = ηm is the graph It = (I(1), I(2),…, I(t)) over group K* of type homomorphism of semigroup of s,rSWm(K*) into (r, s, m) and parameter n, n < m. We can define ESn(K), n = s + m. another time dependent linguistic graph We refer to s,rSWm(K*) as space of symbolic ~ ~ ~ ~ n ( I t ) ( I (1), I (2),..., I (t )) where I ( j ) , j walks of type (s, r) and say that η is a compression =1, 2,…, t is obtained from I(j) by deleting the last map of this space. We refer to η (s,rSWm(K*) =s,r coordinates xn+s+1, xn+s+2,…, xm+s of points and Sm(K*) as chain transition subsemigroup of yn+s+1, yn+s+2,…, ym+s of lines and cancellation of ESs+m(K) of type (s, r) and to η (u, It) as chain 100 the last n - m equations in the definition of It. The and forms rev(d 2 ) d 2' . Alice constructs map μn is the homomorphism of semigroups F(Ls,r,m(K*)) onto F(Ls,r,n(K*)). y1 n ( d 2c1' d 2' ), y2 n ( d 2c2' d 2' ),..., It induces the homomorphism πn of sSTr(K*) × yk (1) n ( d 2ck' (1) d 2' ) F(Ls,r,m(K*)) onto sSTr(K*) × F(Ls,r,n(K*)) acting She takes some Jordan Gauss generators G1, by the rule πn(u, It) = (u, μn(It)). It is clear that G2,…, Gk(3), k(3) ≥ 1 from EGn+s(K) and computes π(s,rSWm(K*) =s,rSWn(K*). ' ' ' Composition of πn and s,rηn defines their inverses G1, G2 ,...,Gk (3) and G = G1G2k(3) homomorphism of s,rSWm(K*) onto s,rSn(K*) with G-1. Alice forms b1 = Gy1G-1, a2 = Gy2G-1,…, In fact, the diagram formed by maps bk(1) = Gyk(1)G-1. π : s,rSWm(K*) → s, rSWn(K*), s,rηm :s,rSWm(K*) She sends pairs (ai, bi), i = 1, 2,…, k(1) to Bob. → Sm(K*), s,r Bob takes tuple (j(1), j(2),…, j(q)), q = O(1), q s,r ηn :s,rSWn(K*) →s,r Sn(K*), τn :s,r Sm(K*) →s,r ≥2 where j(i) ϵ {1, 2,…, k(1)} such that |{j((1), Sn(K*) j(2),…, j(q)}| ≥ 2. He forms a =aj(1)aj(2)… aj(q) and where τn is the restriction of endomorphism of sends it to Alice. Bob computes b = bj(1)bj(2)… bj(q) K* < x1, x2,…, xm+s > on K* < x1, x2,…, xn+s > and keeps it safely in his private storage. given by its values on x1, x2,…, xn+s, is the Alice computes 1a = J-1aJ, 2a = m(rev(d1)) aηm(d1), τn(2a) 1 commutative one. =1 b, TAHOMA PROTOCOL (tahoma stands for 2 b=ηn(d2)( b)ηn(rev(d2) and collision element b as 2 the abbreviation of "tame homomorphism”) G(2b)G-1. Note that b is an element ESn+s(K). Alice selects positive integers s, r, m and n, n Remark 3.1. The security of protocol rests on < m together with commutative ring K with the the complexity of problem of decomposition of unity. Assume that m = O(n) and m > αn where α element from ESn(K) in the composition of > 1, s ≥1, r ≥ 1, s = 0(1), r = O(1). Alice considers generators. This problem is an intractable one semigroup s,rSWm(K*) and takes its elements c1= even in the case of the usage Turing machine (t(1)u1,1It(1)), c2 = (t(2)u2,2It(2)),…, ck(1) =(t(k(1)ut(k(1)),k(1) jointly with Quantum computer. It(k(1))) where k(1) ≥ 2, k(1)=O(1) , t(i) ≥ 2, i = 1, 2,…, k(1). 4. Examples of Sparse Graphs Additionally, she takes d1 = (tu, It), It = (I(1), I(2),…, I(t)), t ≥ 2 from s,rGWm(K*) with tu = (H1, and Protocol based G1, G2, H2,…,H4t-1, G4t-1, H4t, H0) where H0 is Cryptosystems Jordan - Gauss element of EGs(K). She computes H 01,t u ' rev(t u ), I t' ( I (t ), I (t ),..., I (1)) and Well known linguistic graph A(k;K) over d1' (t u ' , I t' ) . commutative ring K [27, 28] of type (1, 1, n - 1) is Alice computes d1c1d1' , d1c2d1' ,..., d1ck (1) d1' in given by equations x2 - y2 = y1x1, x3 - y3 = x1y2, x4 - y4 = y1x3, x5 - y5 = x1y4,…, xk - yk = y1xk-1 in the the semigroup s,rSWm(K*). She applies mη to these case of even k. We consider linguistic graph A(k, elements and gets K*) over commutative group K* of type (1, 1, k - z1 m ( d1c1 d1' ), z 2 m ( d1c 2 d1' ),..., 1) given by equations x2/y2 = y1x1, x3/y3 = x1y2, z k (1) m ( d1c k ( 2) d1' x4/y4 = y1x3, x5/y5 = x1y4,…, xk/yk = y1xk-1. Alice takes some Jordan Gauss generators J1, We define class of time dependent graphs DAT J2,…, Jk(2), k(2) ≥1, from EGm+s(K) and computes (k, K*), T ≥ 1, k ≥ 2 given by equations x2a(1,t)y2b(1,t) their inverses J1' , J 2' ,..., J k' ( 2) and J1 J2… Jk(2) = y1c(1,t)x1d(1,t), x3a(2,t)y3b(2,t) = x1c(2,t)y2d(2,t),x4a(3,t)y4b(3,t) = y1c(3,t)x2d(3,t), x5a(4,t)y5b(4,t) = x1c(4,t)y4d(4,t),…, xka(k- together with J-1. She forms a1 = Jz1J-1, a2 = Jz2J- 1,t) b(k-1,t) yk = y1c(k-1,t)xk-1d(k-1,t) with a(i, t), b(i, t), c(i, 1 ,…, ak(1) = Jzk(1)J-1. t), d(i, t) from Zd - 0, d = |K*|, i = 1, 2,…, k - 1, t Alice computes = 1, 2,…, T such that a(i) and b(i) are mutually с1 n (c1), c2 n (c2 ),...,k (1) n (ck (1) ) . ~ ~ prime with d. The graph depends on data D given She takes d 2 (t v, I~ ' ) from ' s,r GWn(K*), by parameters (a(i, t), b(i, t), c(i, t), d(i, t)), t ϵ [1; ~ t T], i = 1, 2,…, k -1. These graphs were used for where It has type (s, r, n), the implementation of the protocol together with v ( H 1' , G1' , G 2' , H 2' ,..., H 4' t ' 1 , G 4' t ' 1 , G 4' t ' , Jordan - Gauss transformations of kind J: x1 → H 4' t ' , H 0' ) qx1 m(1)x2 m(2) … xk m(k), xi → xi, i = 2, 3,…, k. In [8] the output of implemented protocol from ESn+1(K) 101 is used for the construction of polynomial [3] F. Kipchuk, et al., Investigation of encryption map of plaintext space K n , 1 , Availability of Wireless Access Points based which has exponential degree and density. The on Embedded Systems, in VI International execution speed is O(n 2 ) . The map is Scientific and Practical Conference constructed in terms of linguistic graph A(nα;K). Problems of Infocommunications. Science It is implemented in the case of finite fields of and Technology, 2019, pp. 246–250. doi: 10.1109/PICST47496.2019.9061551. characteristic 2 and K Z l , l 2 . The security 2 [4] A Myasnikov, V. Shpilrain, A. Ushakov, of this cryptosystem rests on the security of the Noncommutative Cryptography and protocol. Complexity of Group-theoretic Problems, Amer. Math Soc. 2011. 5. Conclusions [5] J. A. Lopez Ramos, et al., Group Key Management based on Semigroup Actions, Journal of Algebra and its Applications, We suggest the method of generation vol.16 , 2019. transformations of semigroup nES(K) and group n [6] V. Ustimenko, On semigroups of EG(K), where K is finite commutative ring, in multivariate transformations constructed in terms of time dependent linguistic graphs over terms of time dependent linguistic graphs and commutative group K*. The method can be used solutions of Post Quantum Multivariate for generation of subsemigroups nS