Skip to main content

On the Semidirect Discrete Logarithm Problem in Finite Groups

  • Conference paper
  • First Online:
Advances in Cryptology – ASIACRYPT 2024 (ASIACRYPT 2024)

Abstract

We present an efficient quantum algorithm for solving the semidirect discrete logarithm problem (\(\textsf{SDLP}\)) in any finite group. The believed hardness of the semidirect discrete logarithm problem underlies more than a decade of works constructing candidate post-quantum cryptographic algorithms from non-abelian groups.  We use a series of reduction results to show that it suffices to consider \(\textsf{SDLP}\) in finite simple groups. We then apply the celebrated Classification of Finite Simple Groups to consider each family. The infinite families of finite simple groups admit, in a fairly general setting, linear algebraic attacks providing a reduction to the classical discrete logarithm problem. For the sporadic simple groups, we show that their inherent properties render them unsuitable for cryptographically hard \(\textsf{SDLP}\) instances, which we illustrate via a Baby-Step Giant-Step style attack against \(\textsf{SDLP}\) in the Monster Group.

Our quantum \(\textsf{SDLP}\) algorithm is fully constructive, up to the computation of maximal normal subgroups, for all but three remaining cases that appear to be gaps in the literature on constructive recognition of groups; for these cases \(\textsf{SDLP}\) is no harder than finding a linear representation. We conclude that \(\textsf{SDLP}\) is not a suitable post-quantum hardness assumption for any choice of finite group.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Interestingly, this method is somewhat similar to the “linear decomposition” attacks presented in the analysis of SDPKE.

  2. 2.

    The situation is actually slightly more complicated than this, as we will see.

  3. 3.

    Note that the dimension of the representation implied by Cayley’s theorem is rather large. For the groups we are interested in we will have to work harder than this to find lower-dimensional linear representations.

References

  1. László Babai and Robert Beals. A polynomial-time theory of black box groups i. London Mathematical Society Lecture Note Series, pages 30–64, 1999

    Google Scholar 

  2. László Babai, Robert Beals, and Ákos Seress. Polynomial-time theory of matrix groups. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, STOC ’09, page 55-64, New York, NY, USA, 2009. Association for Computing Machinery

    Google Scholar 

  3. László Babai, Gene Cooperman, Larry Finkelstein, Eugene Luks, and Ákos Seress. Fast monte carlo algorithms for permutation groups. In Proceedings of the twenty-third annual ACM symposium on Theory of computing, pages 90–100, 1991

    Google Scholar 

  4. László Babai and Endre Szemerédi. On the complexity of matrix group problems i. In 25th Annual Symposium onFoundations of Computer Science, 1984., pages 229–240. IEEE, 1984

    Google Scholar 

  5. Reinhold Baer. Der reduzierte Rang einer Gruppe. Journal für die reine und angewandte Mathematik, 0214_0215: 146–173, 1964. URL http://eudml.org/doc/150612

  6. Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti. A subexponential quantum algorithm for the semidirect discrete logarithm problem, 2023

    Google Scholar 

  7. Christopher Battarbee, Delaram Kahrobaei, Ludovic Perret, and Siamak F. Shahandashti. Spdh-sign: Towards efficient, post-quantum group-based signatures. In Thomas Johansson and Daniel Smith-Tone, editors, Post-Quantum Cryptography, pages 113–138, Cham, 2023. Springer Nature Switzerland

    Google Scholar 

  8. Christopher Battarbee, Delaram Kahrobaei, and Siamak F Shahandashti. Semidirect product key exchange: The state of play. Journal of Algebra and Its Applications, page 2550066, 2023

    Google Scholar 

  9. Alexandre Borovik and Sukru Yalcinkaya. Steinberg presentations of black box classical groups in small characteristics, 2013

    Google Scholar 

  10. Alexandre Borovik and Şükrü Yalçınkaya. Natural representations of black box groups encrypting \(sl_2(\mathbb{F}_q)\), 2020

    Google Scholar 

  11. Alexander Bors. A bound on element orders in the holomorph of a finite group, 2015

    Google Scholar 

  12. Peter A. Brooksbank. Fast constructive recognition of black box symplectic groups. Journal of Algebra, 320 (2): 885–909, 2008. ISSN 0021-8693. Computational Algebra

    Google Scholar 

  13. Brooksbank, Peter A.: Fast constructive recognition of black-box unitary groups. LMS Journal of Computation and Mathematics 6, 162–197 (2003)

    Article  MathSciNet  Google Scholar 

  14. Brooksbank, Peter A., Kantor, William M.: Fast constructive recognition of black box orthogonal groups. Journal of Algebra 300(1), 256–288 (2006)

    Article  MathSciNet  Google Scholar 

  15. Brooksbank, Peter A., Kantor, William M.: On constructive recognition of a black box psl (d, q). Groups and computation 3, 95–111 (1999)

    Google Scholar 

  16. Brown, Daniel, Koblitz, Neal, Legrow, Jason: Cryptanalysis of ‘make’. J. Math. Cryptol. 16(1), 98–102 (2015)

    Article  MathSciNet  Google Scholar 

  17. Childs, Andrew M., Ivanyos, Gábor.: Quantum computation of discrete logarithms in semigroups. J. Math. Cryptol. 8(4), 405–416 (2014)

    Article  MathSciNet  Google Scholar 

  18. Marston Conder and Charles R. Leedham-Green. Fast recognition of classical groups over large fields. Groups and computation, III (Columbus, OH, 1999), 8: 113–121, 2001

    Google Scholar 

  19. Conder, Marston, Leedham-Green, Charles R., O’Brien, Eamonn: Constructive recognition of \(PSL (2, q)\). Trans. Amer. Math. Soc. 358(3), 1203–1221 (2006)

    Article  MathSciNet  Google Scholar 

  20. Conway, John H., Curtis, Robert T., Norton, Simon P., Parker, Richard A., Wilson, Robert A.: Atlas of finite groups. Oxford University Press, Eynsham (1985)

    Google Scholar 

  21. Dietrich, Heiko, Leedham-Green, Charles R., O’Brien, Eamonn A.: Effective black-box constructive recognition of classical groups. Journal of Algebra 421, 460–492 (2015)

    Article  MathSciNet  Google Scholar 

  22. Daniel Gorenstein, Richard. Lyons, and Ron Solomon. The classification of finite simple groups. Number 3. Part I. American Mathematical Society, Providence, RI, 1998

    Google Scholar 

  23. Grigoriev, Dima, Shpilrain, Vladimir: Tropical cryptography ii: extensions by homomorphisms. Communications in Algebra 47(10), 4224–4229 (2019)

    Article  MathSciNet  Google Scholar 

  24. Maggie Habeeb, Delaram Kahrobaei, Charalambos Koupparis, and Vladimir Shpilrain. Public key exchange using semidirect product of (semi)groups. In International Conference on Applied Cryptography and Network Security, pages 475–486. Springer, 2013

    Google Scholar 

  25. Muhammad Imran and Gábor Ivanyos. Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem. Designs, Codes and Cryptography, 5 2024

    Google Scholar 

  26. Gábor Ivanyos, Frédéric Magniez, and Miklos Santha. Efficient quantum algorithms for some instances of the non-abelian hidden subgroup problem. Proceedings of the 13th Annual ACM Symposium on Parallel Algorithms and Architectures, pages 263–270, 2001

    Google Scholar 

  27. Sebastian Jambor, Martin Leuner, Alice C Niemeyer, and Wilhelm Plesken. Fast recognition of alternating groups of unknown degree. Journal of Algebra, 392: 315–335, 2013

    Google Scholar 

  28. Delaram Kahrobaei and Vladimir Shpilrain. Using semidirect product of (semi) groups in public key cryptography. In Arnold Beckmann, Laurent Bienvenu, and Nataša Jonoska, editors, Pursuit of the Universal, pages 132–141, Cham, 2016. Springer International Publishing

    Google Scholar 

  29. Kantor, W.M., Magaard, K.: Black box exceptional groups of Lie type. Trans. Amer. Math. Soc. 365(9), 4895–4931 (2013)

    Article  MathSciNet  Google Scholar 

  30. Kantor, W.M., Magaard, K.: Black box exceptional groups of lie type ii. Journal of Algebra 421, 524–540 (2015)

    Article  MathSciNet  Google Scholar 

  31. Kantor, William M., Kassabov, Martin: Black box groups isomorphic to pgl (2, 2e). Journal of Algebra 421, 16–26 (2015)

    Article  MathSciNet  Google Scholar 

  32. Kimmerle, Wolfgang, Lyons, Richard, Sandling, Robert, Teague, David N.: Composition factors from the group ring and artin’s theorem on orders of simple groups. Proceedings of the London Mathematical Society 3(1), 89–122 (1990)

    Article  MathSciNet  Google Scholar 

  33. Stefan Kohl. A bound on the order of the outer automorphism group of a finite simple group of given order, 2003. Available at https://stefan-kohl.github.io/preprints/outbound.pdf

  34. Leedham-Green, Charles R.: The computational matrix group project. Groups and computation 3, 229–248 (2001)

    Article  MathSciNet  Google Scholar 

  35. Andrew Mendelsohn, Edmund Dable-Heath, and Cong Ling. A Small Serving of Mash: (Quantum) Algorithms for SPDH-Sign with Small Parameters. Cryptology ePrint Archive, Paper 2023/1963, 2023. URL https://eprint.iacr.org/2023/1963

  36. Chris Monico. Remarks on MOBS and cryptosystems using semidirect products, 2021

    Google Scholar 

  37. Chris Monico and Ayan Mahalanobis. A remark on MAKE – a Matrix Action Key Exchange, 2020

    Google Scholar 

  38. Myasnikov, Alexei, Roman’kov, Vitaliǐ: A linear decomposition attack. Groups Complexity Cryptology 7(1), 81–94 (2015)

    Article  MathSciNet  Google Scholar 

  39. NIST. Post-Quantum Cryptography Standardization, 2017. URL: https://csrc.nist.gov/Projects/Post-Quantum-Cryptography

  40. Eamonn A O’Brien. Algorithms for matrix groups. London Math. Soc. Lecture Note Ser, 388: 297–323, 2011

    Google Scholar 

  41. Rahman, Nael, Shpilrain, Vladimir: Make: A matrix action key exchange. J. Math. Cryptol. 16(1), 64–72 (2022)

    Article  MathSciNet  Google Scholar 

  42. Nael Rahman and Vladimir Shpilrain. MOBS (Matrices Over Bit Strings) public key exchange. Cryptology ePrint Archive, Paper 2021 /560, 2021. URL https://eprint.iacr.org/2021/560

  43. Vitaliĭ Roman’kov. Linear decomposition attack on public key exchange protocols using semidirect products of (semi) groups, 2015

    Google Scholar 

  44. Martin Seysen. Python implementation of the monster group. GitHub repository, 2024. URL https://github.com/Martin-Seysen/mmgroup

  45. Daniel Shanks. Class number, a theory of factorization, and genera. In Proceedings of Symposia in Pure Mathematics, 1971

    Google Scholar 

  46. Peter W. Shor. Algorithms for quantum computation: discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science, pages 124–134, 1994

    Google Scholar 

  47. Victor Shoup. Lower bounds for discrete logarithms and related problems. In Walter Fumy, editor, Advances in Cryptology — EUROCRYPT ’97, pages 256–266, Berlin, Heidelberg, 1997. Springer Berlin Heidelberg

    Google Scholar 

  48. Robert A. Wilson. The Finite Simple Groups, volume 251 of Graduate Texts in Mathematics. Springer, 2009

    Google Scholar 

Download references

Acknowledgments

This collaboration was initiated during the “Post-Quantum Group-Based Cryptography” workshop at the American Institute of Mathematics (AIM), April 29-May 3, 2024. The authors are indebted to the workshop organizers Delaram Kahrobaei and Ludovic Perret and the AIM team for bringing this group together and creating a stimulating and collaborative atmosphere.

We want to thank Ray Perlner for spotting problems in the reasoning of an earlier version of this paper, and bringing those to our attention. We would also like to Gábor Ivanyos, with whom we had helpful correspondence. We also would like to acknowledge support by the following organizations: CB is supported by ONR Grant 62909-24-1-2002. GB is supported by SNSF Consolidator Grant CryptonIs 213766. DCST was partially supported by a grant from the Simons Foundation (712530, DCST). DJ is supported by an NSERC Alliance Consortia Quantum Grant (ALLRP 578463 – 22). LM is supported by an NSERC Canada Graduate Scholarship (Master’s). NH is supported by a gift from Google. RS is supported by NATO SPS project G5985. EP is supported by NCAE grant H98230-22-1-0328.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Christopher Battarbee or Giacomo Borin .

Editor information

Editors and Affiliations

Appendix: Finding Maximal Normal Subgroups

Appendix: Finding Maximal Normal Subgroups

The task of finding a maximal normal subgroup depends on the particular implementation of the black-box group G. In general, if we know the particular structure of the group G, we may be able to recover them immediately from it. This can be done even with little knowledge, since from any subgroup S we can construct the smallest normal subgroup containing it via computing the normal closure \(\langle S^G \rangle \) in linear time as explained in [3].

In the literature, several techniques are known to solve this task more systematically, via computing a composition series, in this way the first element in the series (starting from G) is our desired normal subgroup. However, this branch of literature typically wishes to achieve much stronger results, in particular without using quantum computers - we do not impose this limitation upon ourselves. To perform this calculation, aided by a quantum computer, we can:

  • Use [25] if every non-Abelian composition factor of G possesses a faithful permutation representation of degree polynomial in the input size;

  • Otherwise, [1, Theorem 1.1] gives us a quasi-composition series for G. Note that [1] requires a superset of the primes dividing the order of the group |G| to solve the problem of computing order of group elements, with a quantum computer we can solve both these tasks. This result provides a quasi-composition chain \(\{1\} \triangleleft G_{m-1} \triangleleft \cdots \triangleleft G_1 \triangleleft G\), and tells us if \(G/G_1\) is abelian, or simple and nonabelian. In the latter case, we have found a maximal normal subgroup \(N = G_1\). In the former case, if \(A = G/G_1\) has the unique encoding property, we can use [26, Theorem 6] on it, since abelian groups are solvable, i.e. \(\nu (G) =1\), and the procedure runs in quantum polynomial time. In this way we get the maximal normal subgroup \(A_1 \triangleleft A\) from the composition series, and \(A_1 G_1\) will be a maximal normal in G by the correspondence theorem. However, the general results from [1], does not immediately imply the unique-encoding property requested, so additional work may be required to solve this problem for the general case, even if in more concrete cases this may be practical.

In general, we do not expect that these problems should be of some fundamental computational difficulty. We leave the full resolution of the computation of maximal normal subgroups to further work.

Rights and permissions

Reprints and permissions

Copyright information

© 2025 International Association for Cryptologic Research

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Battarbee, C. et al. (2025). On the Semidirect Discrete Logarithm Problem in Finite Groups. In: Chung, KM., Sasaki, Y. (eds) Advances in Cryptology – ASIACRYPT 2024. ASIACRYPT 2024. Lecture Notes in Computer Science, vol 15491. Springer, Singapore. https://doi.org/10.1007/978-981-96-0944-4_11

Download citation

  • DOI: https://doi.org/10.1007/978-981-96-0944-4_11

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-96-0943-7

  • Online ISBN: 978-981-96-0944-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics