Skip to main content

Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6061))

Abstract

In this paper we introduce a new key exchange algorithm (Diffie-Hellman like) based on so called (non-commutative) skew polynomials. The algorithm performs only polynomial multiplications in a special small field and is very efficient. The security of the scheme can be interpretated in terms of solving binary quadratic equations or exhaustive search of a set obtained through linear equations. We give an evaluation of the security in terms of precise experimental heuristics and usual bounds based on Groebner basis solvers. We also derive an El Gamal like encryption protocol. We propose parameters which give 3600 bits exchanged for the key exchange protocol and a size of key of 3600 bits for the encryption protocol, with a complexity of roughly 223 binary operations for performing each protocol. Overall this new approach based on skew polynomials, seems very promising, as a good tradeoff between size of keys and efficiency.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bosma, W., Cannon, J., Playoust, C.: The magma algebra system i: The user language. Journal of Symbolic Computation 24, 235–265 (1997)

    Article  MATH  MathSciNet  Google Scholar 

  2. Turrel-Bardet, M.: Etude des systèmes algébriques surdéterminés. Applications aux codes correcteurs et la cryptographie., Ph.D. Thesis, Université de Paris VI, Pierre et Marie Curie (2004)

    Google Scholar 

  3. Bronstein, M., Petkovsek, M.: On Ore Rings, Linear Operators and Factorisation. Programming and Computer Software 20, 27–44 (1994)

    MathSciNet  Google Scholar 

  4. Courtois, N., Klimov, A., Patarin, J., Shamir, A.: Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomil Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 392–407. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Faugère, J.-C.: A new efficient algorithm for computing Grobner bases without reduction to zero (f5). In: Mora, T. (ed.) ISSAC 2002, pp. 75–83 (2002)

    Google Scholar 

  6. Fraenkel, A.S., Yesha, Y.: Complexity of problems in games, graphs and algebraic equations. Discrete Applied Mathematics 1, 15–30 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  7. Giesbrecht, M.: Factoring in skew-polynomial rings over finite fields. J. Symbolic Comput. 26(4), 463–486 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  8. Jacobson, N.: The theory of rings. Publication of the AMS (1943)

    Google Scholar 

  9. McDonald, B.R.: Finite Rings with Identity. Marcel Dekker Inc., New York (1974)

    MATH  Google Scholar 

  10. Ore, O.: Theory of non-commutative polynomials. Ann. of Math. 34 (1933)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boucher, D., Gaborit, P., Geiselmann, W., Ruatta, O., Ulmer, F. (2010). Key Exchange and Encryption Schemes Based on Non-commutative Skew Polynomials. In: Sendrier, N. (eds) Post-Quantum Cryptography. PQCrypto 2010. Lecture Notes in Computer Science, vol 6061. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12929-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12929-2_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12928-5

  • Online ISBN: 978-3-642-12929-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics