Cryptographic algorithms based on Ramanujan graphs
| Ano de defesa: | 2023 |
|---|---|
| Autor(a) principal: | |
| Orientador(a): | |
| Banca de defesa: | |
| Tipo de documento: | Tese |
| Tipo de acesso: | Acesso aberto |
| Idioma: | eng |
| Instituição de defesa: |
Laboratório Nacional de Computação Científica
Coordenação de Pós-Graduação e Aperfeiçoamento (COPGA) Brasil LNCC Programa de Pós-Graduação em Modelagem Computacional |
| Programa de Pós-Graduação: |
Não Informado pela instituição
|
| Departamento: |
Não Informado pela instituição
|
| País: |
Não Informado pela instituição
|
| Palavras-chave em Português: | |
| Link de acesso: | https://tede.lncc.br/handle/tede/367 |
Resumo: | Ramanujan graphs are optimal expanders, and expander graphs are sparse graphs that have very important properties such as low diameter, high connectivity, and high chromatic number. These graphs are also applied to block ciphers, such as Advanced Encryption Standard (AES). Much of the security of AES is present in its Substitution-Box (S- Box), in the same way that other block ciphers. In the literature, several methods have been proposed to create strong S-Boxes for AES. A strong S-Box should satisfy several cryptographic properties to resist linear and differential cryptanalysis. An S-Box is a Boolean function. If a Boolean function is bent, then its S-Box associated has maximum nonlinearity, a relevant cryptographic property for construction of S-Boxes resistant to linear cryptanalysis. Ramanujan graph is related to bent functions, namely, a Cayley graph associated with bent function is always a Ramanujan graph. Although, the AES S-Box is not bent, we identified that its circulant matrix in the subbytes is an adjacency matrix of a Ramanujan graph and propose an algorithm to verify the relationship found. We proposed a theorem and demonstrated the relationship between the Ramanujan graph and the circulant matrix used in AES. We define a B-Ramanujan matrix as a {0, 1}-circulant adjacency matrix of a Ramanujan graph. We also verified that B-Ramanujan matrices guarantee strong S-Boxes. For the case of AES-256, we should choose a matrix in a set with approximately 1018 nonsingular binary matrices. However, our result reduces the search to a set of 247 B-Ramanujan matrices, where only 152 are nonsingular. Grover’s Algorithm could attack AES with a 256-bit key length in approximately 2128 iterations. This algorithm is a quantum algorithm with complexity O(√N ), where N is the domain size of the function. For the case of a 1024-bit key, Grover’s algorithm could brutally force AES into approximately 2512 iterations. However, this big AES would avoid quantum attacks and its S-Box can be construct using the proposed theorem. Indeed, we can use this technique in every block cipher. In addition, we obtain a numerical sequence consisting of the number of n × n B-Ramanujan matrices. The relevance of Ramanujan graphs applied in cryptography motivated our study in the search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo proposed a key-agreement isogeny-based algorithm supposed to be resistant to quantum attacks. It is based on supersingular isogeny (Ramanujan) graph walks. Recently, the Supersingular Isogeny Key Encapsulation (SIKE) reached the fourth round of the NIST’s standardization process on post-quantum cryptography. However, these algorithms were attacked by Wouter Castryck and Thomas Decru with Kani’s theorem a few months ago. This attack does not threaten all cryptosystems based on isogeny graphs. In the first half of 2022, we propose a SIKE- like considering the degrees of isogenies in the encryption and decryption process. Our SIKE-like is additive homomorphic. The recent attack on SIKE exposed vulnerability in our algorithm only in the explicit part about the degrees of isogenies. We are analyzing the attack to propose a version resistant to the current attack. |
| id |
LNCC_260c8bb0f63874ea397d7dd87b32e913 |
|---|---|
| oai_identifier_str |
oai:tede-server.lncc.br:tede/367 |
| network_acronym_str |
LNCC |
| network_name_str |
Biblioteca Digital de Teses e Dissertações do LNCC |
| repository_id_str |
|
| spelling |
Cryptographic algorithms based on Ramanujan graphsCriptografiaCriptografia de dados (Computação)Grafos RamanujanTeoria dos grafosMatrizes (Matemática)CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAORamanujan graphs are optimal expanders, and expander graphs are sparse graphs that have very important properties such as low diameter, high connectivity, and high chromatic number. These graphs are also applied to block ciphers, such as Advanced Encryption Standard (AES). Much of the security of AES is present in its Substitution-Box (S- Box), in the same way that other block ciphers. In the literature, several methods have been proposed to create strong S-Boxes for AES. A strong S-Box should satisfy several cryptographic properties to resist linear and differential cryptanalysis. An S-Box is a Boolean function. If a Boolean function is bent, then its S-Box associated has maximum nonlinearity, a relevant cryptographic property for construction of S-Boxes resistant to linear cryptanalysis. Ramanujan graph is related to bent functions, namely, a Cayley graph associated with bent function is always a Ramanujan graph. Although, the AES S-Box is not bent, we identified that its circulant matrix in the subbytes is an adjacency matrix of a Ramanujan graph and propose an algorithm to verify the relationship found. We proposed a theorem and demonstrated the relationship between the Ramanujan graph and the circulant matrix used in AES. We define a B-Ramanujan matrix as a {0, 1}-circulant adjacency matrix of a Ramanujan graph. We also verified that B-Ramanujan matrices guarantee strong S-Boxes. For the case of AES-256, we should choose a matrix in a set with approximately 1018 nonsingular binary matrices. However, our result reduces the search to a set of 247 B-Ramanujan matrices, where only 152 are nonsingular. Grover’s Algorithm could attack AES with a 256-bit key length in approximately 2128 iterations. This algorithm is a quantum algorithm with complexity O(√N ), where N is the domain size of the function. For the case of a 1024-bit key, Grover’s algorithm could brutally force AES into approximately 2512 iterations. However, this big AES would avoid quantum attacks and its S-Box can be construct using the proposed theorem. Indeed, we can use this technique in every block cipher. In addition, we obtain a numerical sequence consisting of the number of n × n B-Ramanujan matrices. The relevance of Ramanujan graphs applied in cryptography motivated our study in the search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo proposed a key-agreement isogeny-based algorithm supposed to be resistant to quantum attacks. It is based on supersingular isogeny (Ramanujan) graph walks. Recently, the Supersingular Isogeny Key Encapsulation (SIKE) reached the fourth round of the NIST’s standardization process on post-quantum cryptography. However, these algorithms were attacked by Wouter Castryck and Thomas Decru with Kani’s theorem a few months ago. This attack does not threaten all cryptosystems based on isogeny graphs. In the first half of 2022, we propose a SIKE- like considering the degrees of isogenies in the encryption and decryption process. Our SIKE-like is additive homomorphic. The recent attack on SIKE exposed vulnerability in our algorithm only in the explicit part about the degrees of isogenies. We are analyzing the attack to propose a version resistant to the current attack.Os grafos de Ramanujan são ótimos grafos expansores, estes grafos são esparsos e têm propriedades muito importantes, como diâmetro baixo, alta conectividade e alto número cromático. Estes grafos também são aplicados às cifras de bloco, como o Advanced Encryption Standard (AES). Grande parte da segurança do AES está presente em sua Substitution-Box (S-Box), da mesma forma que outras cifras de bloco. Na literatura, vários métodos têm sido propostos para criar S-Boxes fortes para o AES. Uma S-Box forte deve satisfazer várias propriedades criptográficas para resistir às criptoanálises linear e diferencial. Uma S-Box é uma função Booleana. Se uma função Booleana é bent, então sua S-Box associada tem não linearidade máxima, uma propriedade criptográfica relevante para construção de S-Boxes resistentes à criptoanálise linear. O grafo de Ramanujan está relacionado às funções bent, ou seja, um grafo de Cayley associado a uma função bent é sempre um grafo de Ramanujan. Embora a S-Box do AES não seja bent, identificamos que sua matriz circulante, na etapa subbytes do AES, é uma matriz de adjacência de um grafo Ramanujan e propomos um algoritmo para verificar a relação encontrada. Propomos um teorema e demonstramos a relação entre o grafo de Ramanujan e a matriz circulante usada no AES. Definimos uma matriz B-Ramanujan como uma matriz {0, 1}-circulante de adjacência do grafo de Ramanujan. Também verificamos que as matrizes B-Ramanujan garantem S-Boxes fortes. Para o caso de AES-256, devemos escolher uma matriz em um conjunto com aproximadamente 1018 matrizes binárias não singulares. No entanto, nosso resultado reduz a busca a um conjunto de 247 matrizes B-Ramanujan, onde somente 152 são não singulares. O algoritmo de Grover poderia atacar o AES com um comprimento de chave de 256 bits em aproximadamente 2128 iterações. Este algoritmo é um algoritmo quântico com complexidade O(√N ), onde N é o tamanho do domínio da função. Para o caso de uma chave de 1024 bits, o algoritmo de Grover poderia forçar brutalmente o AES em aproximadamente 2512 iterações. No entanto, este AES com tamanho de chave maior evitaria ataques quânticos e sua S-Box pode ser construída usando o teorema proposto. De fato, podemos usar essa técnica em todas as cifras de bloco. Além disso, obtemos uma sequência numérica que consiste no número de matrizes n × n B-Ramanujan. A relevância dos grafos de Ramanujan aplicados à criptografia motivou nosso estudo na busca por um algoritmo pós-quântico e homomórfico baseado em tais grafos. Em 2011, Jao e De Feo propuseram um algoritmo de acordo de chave baseado em isogenia, supostamente resistente a ataques quânticos. Este algoritmo baseia-se em caminhos nos grafos de isogenias supersingulares (Ramanujan). Recentemente, o Supersingular Isogeny Key Encapsulation (SIKE) alcançou a quarta rodada do processo de padronização do NIST em criptografia pós-quântica. No entanto, esses algoritmos foram atacados por Wouter Castryck e Thomas Decru com o teorema de Kani alguns meses atrás. Este ataque não ameaça todos os criptosistemas baseados em grafos de isogenia. No primeiro semestre de 2022, propomos um SIKE-like considerando os graus de isogenias no processo de encriptação e decriptação. Nosso SIKE-like é homomórfico aditivo. O recente ataque ao SIKE expôs a vulnerabilidade em nosso algoritmo somente na parte explícita sobre os graus das isogenias. Estamos analisando o ataque para propormos uma versão resistente a ele.Laboratório Nacional de Computação CientíficaCoordenação de Pós-Graduação e Aperfeiçoamento (COPGA)BrasilLNCCPrograma de Pós-Graduação em Modelagem ComputacionalOliveira, Fábio Borges deOliveira, Fábio Borges dePortugal, RenatoMachado, Raphael Carlos SantosMartucci, Leonardo AugustoBelleza, Marcio Prudêncio2023-05-03T14:12:14Z2023-01-27info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisapplication/pdfBELLEZA, M. P. Cryptographic algorithms based on Ramanujan graphs. 2023. 84 f. Tese (Programa de Pós-Graduação em Modelagem Computacional) - Laboratório Nacional de Computação Científica, Petrópolis, 2023.https://tede.lncc.br/handle/tede/367enghttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessreponame:Biblioteca Digital de Teses e Dissertações do LNCCinstname:Laboratório Nacional de Computação Científica (LNCC)instacron:LNCC2023-05-04T04:32:43Zoai:tede-server.lncc.br:tede/367Biblioteca Digital de Teses e Dissertaçõeshttps://tede.lncc.br/PUBhttps://tede.lncc.br/oai/requestlibrary@lncc.br||library@lncc.bropendoar:2023-05-04T04:32:43Biblioteca Digital de Teses e Dissertações do LNCC - Laboratório Nacional de Computação Científica (LNCC)false |
| dc.title.none.fl_str_mv |
Cryptographic algorithms based on Ramanujan graphs |
| title |
Cryptographic algorithms based on Ramanujan graphs |
| spellingShingle |
Cryptographic algorithms based on Ramanujan graphs Belleza, Marcio Prudêncio Criptografia Criptografia de dados (Computação) Grafos Ramanujan Teoria dos grafos Matrizes (Matemática) CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAO |
| title_short |
Cryptographic algorithms based on Ramanujan graphs |
| title_full |
Cryptographic algorithms based on Ramanujan graphs |
| title_fullStr |
Cryptographic algorithms based on Ramanujan graphs |
| title_full_unstemmed |
Cryptographic algorithms based on Ramanujan graphs |
| title_sort |
Cryptographic algorithms based on Ramanujan graphs |
| author |
Belleza, Marcio Prudêncio |
| author_facet |
Belleza, Marcio Prudêncio |
| author_role |
author |
| dc.contributor.none.fl_str_mv |
Oliveira, Fábio Borges de Oliveira, Fábio Borges de Portugal, Renato Machado, Raphael Carlos Santos Martucci, Leonardo Augusto |
| dc.contributor.author.fl_str_mv |
Belleza, Marcio Prudêncio |
| dc.subject.por.fl_str_mv |
Criptografia Criptografia de dados (Computação) Grafos Ramanujan Teoria dos grafos Matrizes (Matemática) CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAO |
| topic |
Criptografia Criptografia de dados (Computação) Grafos Ramanujan Teoria dos grafos Matrizes (Matemática) CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAO |
| description |
Ramanujan graphs are optimal expanders, and expander graphs are sparse graphs that have very important properties such as low diameter, high connectivity, and high chromatic number. These graphs are also applied to block ciphers, such as Advanced Encryption Standard (AES). Much of the security of AES is present in its Substitution-Box (S- Box), in the same way that other block ciphers. In the literature, several methods have been proposed to create strong S-Boxes for AES. A strong S-Box should satisfy several cryptographic properties to resist linear and differential cryptanalysis. An S-Box is a Boolean function. If a Boolean function is bent, then its S-Box associated has maximum nonlinearity, a relevant cryptographic property for construction of S-Boxes resistant to linear cryptanalysis. Ramanujan graph is related to bent functions, namely, a Cayley graph associated with bent function is always a Ramanujan graph. Although, the AES S-Box is not bent, we identified that its circulant matrix in the subbytes is an adjacency matrix of a Ramanujan graph and propose an algorithm to verify the relationship found. We proposed a theorem and demonstrated the relationship between the Ramanujan graph and the circulant matrix used in AES. We define a B-Ramanujan matrix as a {0, 1}-circulant adjacency matrix of a Ramanujan graph. We also verified that B-Ramanujan matrices guarantee strong S-Boxes. For the case of AES-256, we should choose a matrix in a set with approximately 1018 nonsingular binary matrices. However, our result reduces the search to a set of 247 B-Ramanujan matrices, where only 152 are nonsingular. Grover’s Algorithm could attack AES with a 256-bit key length in approximately 2128 iterations. This algorithm is a quantum algorithm with complexity O(√N ), where N is the domain size of the function. For the case of a 1024-bit key, Grover’s algorithm could brutally force AES into approximately 2512 iterations. However, this big AES would avoid quantum attacks and its S-Box can be construct using the proposed theorem. Indeed, we can use this technique in every block cipher. In addition, we obtain a numerical sequence consisting of the number of n × n B-Ramanujan matrices. The relevance of Ramanujan graphs applied in cryptography motivated our study in the search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo proposed a key-agreement isogeny-based algorithm supposed to be resistant to quantum attacks. It is based on supersingular isogeny (Ramanujan) graph walks. Recently, the Supersingular Isogeny Key Encapsulation (SIKE) reached the fourth round of the NIST’s standardization process on post-quantum cryptography. However, these algorithms were attacked by Wouter Castryck and Thomas Decru with Kani’s theorem a few months ago. This attack does not threaten all cryptosystems based on isogeny graphs. In the first half of 2022, we propose a SIKE- like considering the degrees of isogenies in the encryption and decryption process. Our SIKE-like is additive homomorphic. The recent attack on SIKE exposed vulnerability in our algorithm only in the explicit part about the degrees of isogenies. We are analyzing the attack to propose a version resistant to the current attack. |
| publishDate |
2023 |
| dc.date.none.fl_str_mv |
2023-05-03T14:12:14Z 2023-01-27 |
| dc.type.status.fl_str_mv |
info:eu-repo/semantics/publishedVersion |
| dc.type.driver.fl_str_mv |
info:eu-repo/semantics/doctoralThesis |
| format |
doctoralThesis |
| status_str |
publishedVersion |
| dc.identifier.uri.fl_str_mv |
BELLEZA, M. P. Cryptographic algorithms based on Ramanujan graphs. 2023. 84 f. Tese (Programa de Pós-Graduação em Modelagem Computacional) - Laboratório Nacional de Computação Científica, Petrópolis, 2023. https://tede.lncc.br/handle/tede/367 |
| identifier_str_mv |
BELLEZA, M. P. Cryptographic algorithms based on Ramanujan graphs. 2023. 84 f. Tese (Programa de Pós-Graduação em Modelagem Computacional) - Laboratório Nacional de Computação Científica, Petrópolis, 2023. |
| url |
https://tede.lncc.br/handle/tede/367 |
| dc.language.iso.fl_str_mv |
eng |
| language |
eng |
| dc.rights.driver.fl_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ info:eu-repo/semantics/openAccess |
| rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-nd/4.0/ |
| eu_rights_str_mv |
openAccess |
| dc.format.none.fl_str_mv |
application/pdf |
| dc.publisher.none.fl_str_mv |
Laboratório Nacional de Computação Científica Coordenação de Pós-Graduação e Aperfeiçoamento (COPGA) Brasil LNCC Programa de Pós-Graduação em Modelagem Computacional |
| publisher.none.fl_str_mv |
Laboratório Nacional de Computação Científica Coordenação de Pós-Graduação e Aperfeiçoamento (COPGA) Brasil LNCC Programa de Pós-Graduação em Modelagem Computacional |
| dc.source.none.fl_str_mv |
reponame:Biblioteca Digital de Teses e Dissertações do LNCC instname:Laboratório Nacional de Computação Científica (LNCC) instacron:LNCC |
| instname_str |
Laboratório Nacional de Computação Científica (LNCC) |
| instacron_str |
LNCC |
| institution |
LNCC |
| reponame_str |
Biblioteca Digital de Teses e Dissertações do LNCC |
| collection |
Biblioteca Digital de Teses e Dissertações do LNCC |
| repository.name.fl_str_mv |
Biblioteca Digital de Teses e Dissertações do LNCC - Laboratório Nacional de Computação Científica (LNCC) |
| repository.mail.fl_str_mv |
library@lncc.br||library@lncc.br |
| _version_ |
1832738028412469248 |