Schubert cells and quadratic public keys of Multivariate Cryptography Vasyl Ustimenko1,2 1 University of Royal Holloway in London, Egham Hill, Egham TW20 0EX, United Kingdom 2 Institute of Telecommunications and the Global Information Space of the National Academy of Sciences of Ukraine, Chokolivsky Boulevard 13, Kyiv, 02000, Ukraine Abstract Studies of linear codes in terms of finite projective geometries form traditional direction in Coding Theory. Some applications of projective geometries are known. We introduce new public keys of Multivariate Cryptography given by quadratic public rules generated via walks on incidence substructures of projective geometry with vertexes from two largest Schubert cells. It differs from the known algorithms of Code Based Cryptography and can be considered as the first attempt to combine ideas of this area with the approach of Multivariate Cryptography. Keywords : Multivariate Cryptography, Code Base Cryptography, Projective Geometries, Largest Schubert Cells, Symbolic Computationsy 1 1. Introduction Finite projective geometries were traditionally used for the construction of algorithms of Coding Theory [1]. Their applications to other areas of Information Security have been published (see [2], [3] devoted to Network Coding). In particular, it was used in Cryptography ( see [4], where projective geometry were used for authentication protocols). Nowadays finite geometries are widely used as tools for secret sharing. Additionally they can be used for the design of some stream ciphers of multivariate nature and protocols of Noncommutative Cryptography (see [5] and further references). We introduce the first graph based multivariate public keys with bijective encryption maps generated via special walks on incidence graph of projective geometry. The tender of US National Institute of Standardisation Technology (NIST, 2017) has started the standardisation process of possible Post-Quantum Public keys aimed for the purposes to be (i) encryption tools, (ii) tools for digital signatures (see [6], [7]). In July 2020 the Third Round of the competition started. In the category of Multivariate Cryptography (MC) remaining candidates are easy to observe. For the task (i) multivariate algorithm was not selected, single multivariate candidate is ''The Rainbow Like Unbalanced Oil and Vinegar'' (RUOV) digital signature method. As you see RUOV algorithm is investigated as appropriate instrument for the task (ii). During the Third Round some cryptanalytic instruments to deal with ROUV were found (see [8], [9]). That is why different algorithms were chosen at the final stage. In July 2022 first four winners of NIST standardisation competition were chosen. They all are lattice based algorithms. Noteworthy that all multivariate NIST candidates were presented by multivariate rules of degree bounded by constant (2) of kind x1 →f1(x1, x2,…, xn), x2 → f2(x1, x2, …, xn), ..., xn → fn(x1, x2, … , xn). We think that NIST Proceedings ITTAP’2023: 3rd International Workshop on Information Technologies: Theoretical and Applied Problems, November 22–24, 2023, Ternopil, Ukraine, Opole, Poland EMAIL: Vasyl.Ustymenko@rhul.ac.ukl (A.1); ORCID: 0000-0002-2138-2357 (A.1); ©️ 2020 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings outcomes motivate investigations of alternative options in Multivariate Cryptography oriented on encryption tools for (a) the work with the space of plaintexts (Fq)n and its transformation G of linear degree cn, c>0 on the level of stream ciphers or public keys (b) the usage of protocols of Noncommutative Cryptography with platforms of multivariate transformations for the secure elaboration of multivariate map G from End(Fq[x1, x2,…, xn]) of linear or superlinear degree and density bounded below by function of kind cn r , where c>0 and r>1. Some ideas in directions of (a) and (b) are presented in [10].Alternatively we hope that classical multivariate public key approach (see [11]), i. e. the usage of multivariate rules of degree 2 is still able to bring reliable encryption algorithms. In this paper we suggest new quadratic multivariate public rules defined in terms of Projective Geometry. Recall that multivariate public rule G has to be given in its standard form xi →gi(x1, x2, … , xn), where polynomials gi are given via the lists of monomial terms in the lexicographical order. 2. Linear codes and Schubert cellular graphs The missing definitions of graph-theoretical concepts which appear in this paper can be found in [12]. All graphs we consider are simple graphs, i.e. undirected without loops and multiple edges. Let V(G) and E(G) denote the set of vertexes and the set of edges of G respectively. When it is convenient, we shall identify G with the corresponding anti-reflexive binary relation on V(G), i.e. E(G) is a subset of V(G)∙V(G) and write v G u for the adjacent vertexes u and v (or neighbours). We refer to |{ x ϵ V(G)| xGv }| as degree of the vertex v. The incidence structure is the set V with partition sets P (points) and L (lines) and symmetric binary relation I such that the incidence of two elements implies that one of them is a point and another one is a line. We shall identify I with the simple graph of this incidence relation or bipartite graph. The pair x,y, xϵP, yϵL such that x I y is called a flag of incidence structure I. Projective geometry n-1PG(Fq) of dimension n-1 over the finite field Fq, where q is a prime power, is a totality of proper subspaces of the vector space V=(Fq) n of nonzero dimension. This is the incidence system with type function t(W)=dim(W), W ϵ n-1 PG(Fq) and incidence relation I defined by the condition W1IW2 if and only if one of these subspaces is embedded in another one. We can select standard base e1, e2,…, en of V and identify n-1PG(Fq) with the totality of linear codes in (Fq) n.The geometry n-1ℾ(q)= n-1PG(Fq) is a partition of subsets n-1ℾ(q) i consisting of elements of selected type i, i=1,2, …, n-1. We assume that each element of V is presented in the chosen base as column vector (x1, x1, … , xn). Let U stands for the unipotent subgroup of automorphism group PGLn(Fq) consisting of lower unitriangular matrices.Let us consider orbits of the natural action of U on the projective geometry n-1PG(Fq). They are known as large Schubert cells. Each of orbits on the set ℾm(Fq) contains exactly one symplectic element spanned by elements ei(1), ei(2), ..., ei(m). So the number of orbits of (U, ℾm(Fq)) equals to binomial coefficient C(n,m). Noteworthy that the cardinality of n-1 ℾm(Fq) is expressed by Gaussian binomial coefficient. Unipotent subgroup U is generated by elementary transvections xi,j(t), i