Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Gröbner bases for public key cryptography
Caboara M., Caruso F., Traverso C.  Symbolic and algebraic computation (Proceedings of the Twenty-first International Symposium on Symbolic and Algebraic Computation, Linz/Hagenberg, Austria, Jul 20-23, 2008)315-324.2008.Type:Proceedings
Date Reviewed: Sep 30 2008

The computation of Gröbner bases is a difficult task often encountered in cryptanalysis, the destructive aspect of cryptology. As a general rule, such difficult tasks can be reused constructively, as foundations for new cryptosystems. However, for the specific case of the computations of Gröbner bases, this general rule has been challenged [1]. The goal of this paper is to face this challenge and come up with new cryptosystems based on the hardness of computing Gröbner bases. However, the proposed solution is based on a degenerate version of the general problem. In this degenerate version, the ideals are represented by very sparse polynomials containing only two monomials. As shown in the paper, in this degenerate case, the ideal can also be represented by a simpler object: a lattice. Note that many lattice-based cryptosystems have already been proposed in the literature.

After exhibiting this degenerate case, the paper proceeds to construct two examples of these cryptosystems. The first example uses lattices of a special form and the second is a proposal to generalize the NTRU cryptosystem. Of course, these two systems have not yet been thoroughly studied and their security is mostly an open question. The paper precisely ends, asking whether the proposed systems are insecure or whether they contradict the thesis of Barkee et al. [1].

Reviewer:  Antoine Joux Review #: CR136114 (0912-1189)
1) Barkee, B.; Can, D.C.; Ecks, J.; Moriarty, T.; Ree, R.F. Why you cannot even hope to use Grvbner bases in public key cryptography: an open letter to a scientist who failed and a challenge to those who have not yet failed. J. Symb. Comput. 18, 6(1994), 497–501.
Bookmark and Share
 
Algebraic Algorithms (I.1.2 ... )
 
 
Computations On Polynomials (F.2.1 ... )
 
 
Public Key Cryptosystems (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Algebraic Algorithms": Date
Multilinear Cayley factorization
White N. Journal of Symbolic Computation 11(5-6): 421-438, 1991. Type: Article
May 1 1993
On the synthetic factorization of projectively invariant polynomials
Sturmfels B. (ed), Whiteley W. Journal of Symbolic Computation 11(5-6): 439-453, 1991. Type: Article
Dec 1 1992
Invariant and geometric aspects of algebraic complexity theory I
Morgenstern J. Journal of Symbolic Computation 11(5-6): 455-469, 1991. Type: Article
Jun 1 1993
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy