Non-commutative cryptographic protocols have been developed for solving various cryptographic problems likekey exchange,encryption-decryption, andauthentication. These protocols are very similar to the corresponding protocols in the commutative case.
This a key exchange protocol using a non-abelian groupG. It is significant because it does not require two commuting subgroupsA andB ofG as in the case of the protocol due to Ko, Lee, et al.
Elementsa1,a2, . . . ,ak,b1,b2, . . . ,bm fromG are selected and published.
Alice picks a privatex inG as aword ina1,a2, . . . ,ak; that is,x =x(a1,a2, . . . ,ak ).
Alice sendsb1x,b2x, . . . ,bmx to Bob.
Bob picks a privatey inG as aword inb1,b2, . . . ,bm; that isy =y (b1,b2, . . . ,bm ).
Bob sendsa1y,a2y, . . . ,aky to Alice.
Alice and Bob share the common secret keyK =x−1y−1xy.
Alice computesx (a1y,a2y, . . . ,aky ) =y−1xy. Pre-multiplying it withx−1, Alice getsK.
Bob computesy (b1x,b2x, . . . ,bmx) =x−1yx. Pre-multiplying it withy−1 and then taking the inverse, Bob getsK.
The basis for the security and strength of the various protocols presented above is the difficulty of the following two problems:
Theconjugacy decision problem (also called theconjugacy problem): Given two elementsu andv in a groupG determine whether there exists an elementx inG such thatv =ux, that is, such thatv =x−1ux.
Theconjugacy search problem: Given two elementsu andv in a groupG find an elementx inG such thatv =ux, that is, such thatv =x−1ux.
If no algorithm is known to solve the conjugacy search problem, then the functionx →ux can be considered as aone-way function.
A non-commutative group that is used in a particular cryptographic protocol is called the platform group of that protocol. Only groups having certain properties can be used as the platform groups for the implementation of non-commutative cryptographic protocols. LetG be a group suggested as a platform group for a certain non-commutative cryptographic system. The following is a list of the properties expected ofG.
The groupG must be well-known and well-studied.
Theword problem inG should have a fast solution by a deterministic algorithm. There should be an efficiently computable "normal form" for elements ofG.
It should be impossible to recover the factorsx andy from the productxy inG.
The number of elements of lengthn inG should grow faster than any polynomial inn. (Here "lengthn" is the length of a word representing a group element.)
LetT denote the infiniterootedbinary tree. The setV of vertices is the set of all finite binary sequences. LetA(T) denote the set of all automorphisms ofT. (An automorphism ofT permutes vertices preserving connectedness.) The Grigorchuk's group Γ is the subgroup ofA(T) generated by the automorphismsa,b,c,d defined as follows:
Cao, Zhenfu (2012).New Directions of Modern Cryptography. CRC Press.ISBN978-1-4665-0140-9.
Benjamin Fine; et al. (2011). "Aspects of Nonabelian Group Based Cryptography: A Survey and Open Problems".arXiv:1103.4093 [cs.CR].
Myasnikov, Alexei G.; Shpilrain, Vladimir; Ushakov, Alexander (2011).Non-commutative Cryptography and Complexity of Group-theoretic Problems. American Mathematical Society.ISBN9780821853603.