Cryptographic algorithms based on Ramanujan graphs

Detalhes bibliográficos
Ano de defesa: 2023
Autor(a) principal: Belleza, Marcio Prudêncio
Orientador(a): Não Informado pela instituição
Banca de defesa: Não Informado pela instituição
Tipo de documento: Tese
Tipo de acesso: Acesso aberto
Idioma: eng
Instituição de defesa: Laboratório Nacional de Computação Científica
Coordenação de Pós-Graduação e Aperfeiçoamento (COPGA)
Brasil
LNCC
Programa de Pós-Graduação em Modelagem Computacional
Programa de Pós-Graduação: Não Informado pela instituição
Departamento: Não Informado pela instituição
País: Não Informado pela instituição
Palavras-chave em Português:
Link de acesso: https://tede.lncc.br/handle/tede/367
Resumo: Ramanujan graphs are optimal expanders, and expander graphs are sparse graphs that have very important properties such as low diameter, high connectivity, and high chromatic number. These graphs are also applied to block ciphers, such as Advanced Encryption Standard (AES). Much of the security of AES is present in its Substitution-Box (S- Box), in the same way that other block ciphers. In the literature, several methods have been proposed to create strong S-Boxes for AES. A strong S-Box should satisfy several cryptographic properties to resist linear and differential cryptanalysis. An S-Box is a Boolean function. If a Boolean function is bent, then its S-Box associated has maximum nonlinearity, a relevant cryptographic property for construction of S-Boxes resistant to linear cryptanalysis. Ramanujan graph is related to bent functions, namely, a Cayley graph associated with bent function is always a Ramanujan graph. Although, the AES S-Box is not bent, we identified that its circulant matrix in the subbytes is an adjacency matrix of a Ramanujan graph and propose an algorithm to verify the relationship found. We proposed a theorem and demonstrated the relationship between the Ramanujan graph and the circulant matrix used in AES. We define a B-Ramanujan matrix as a {0, 1}-circulant adjacency matrix of a Ramanujan graph. We also verified that B-Ramanujan matrices guarantee strong S-Boxes. For the case of AES-256, we should choose a matrix in a set with approximately 1018 nonsingular binary matrices. However, our result reduces the search to a set of 247 B-Ramanujan matrices, where only 152 are nonsingular. Grover’s Algorithm could attack AES with a 256-bit key length in approximately 2128 iterations. This algorithm is a quantum algorithm with complexity O(√N ), where N is the domain size of the function. For the case of a 1024-bit key, Grover’s algorithm could brutally force AES into approximately 2512 iterations. However, this big AES would avoid quantum attacks and its S-Box can be construct using the proposed theorem. Indeed, we can use this technique in every block cipher. In addition, we obtain a numerical sequence consisting of the number of n × n B-Ramanujan matrices. The relevance of Ramanujan graphs applied in cryptography motivated our study in the search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo proposed a key-agreement isogeny-based algorithm supposed to be resistant to quantum attacks. It is based on supersingular isogeny (Ramanujan) graph walks. Recently, the Supersingular Isogeny Key Encapsulation (SIKE) reached the fourth round of the NIST’s standardization process on post-quantum cryptography. However, these algorithms were attacked by Wouter Castryck and Thomas Decru with Kani’s theorem a few months ago. This attack does not threaten all cryptosystems based on isogeny graphs. In the first half of 2022, we propose a SIKE- like considering the degrees of isogenies in the encryption and decryption process. Our SIKE-like is additive homomorphic. The recent attack on SIKE exposed vulnerability in our algorithm only in the explicit part about the degrees of isogenies. We are analyzing the attack to propose a version resistant to the current attack.
id LNCC_260c8bb0f63874ea397d7dd87b32e913
oai_identifier_str oai:tede-server.lncc.br:tede/367
network_acronym_str LNCC
network_name_str Biblioteca Digital de Teses e Dissertações do LNCC
repository_id_str
spelling Cryptographic algorithms based on Ramanujan graphsCriptografiaCriptografia de dados (Computação)Grafos RamanujanTeoria dos grafosMatrizes (Matemática)CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAORamanujan graphs are optimal expanders, and expander graphs are sparse graphs that have very important properties such as low diameter, high connectivity, and high chromatic number. These graphs are also applied to block ciphers, such as Advanced Encryption Standard (AES). Much of the security of AES is present in its Substitution-Box (S- Box), in the same way that other block ciphers. In the literature, several methods have been proposed to create strong S-Boxes for AES. A strong S-Box should satisfy several cryptographic properties to resist linear and differential cryptanalysis. An S-Box is a Boolean function. If a Boolean function is bent, then its S-Box associated has maximum nonlinearity, a relevant cryptographic property for construction of S-Boxes resistant to linear cryptanalysis. Ramanujan graph is related to bent functions, namely, a Cayley graph associated with bent function is always a Ramanujan graph. Although, the AES S-Box is not bent, we identified that its circulant matrix in the subbytes is an adjacency matrix of a Ramanujan graph and propose an algorithm to verify the relationship found. We proposed a theorem and demonstrated the relationship between the Ramanujan graph and the circulant matrix used in AES. We define a B-Ramanujan matrix as a {0, 1}-circulant adjacency matrix of a Ramanujan graph. We also verified that B-Ramanujan matrices guarantee strong S-Boxes. For the case of AES-256, we should choose a matrix in a set with approximately 1018 nonsingular binary matrices. However, our result reduces the search to a set of 247 B-Ramanujan matrices, where only 152 are nonsingular. Grover’s Algorithm could attack AES with a 256-bit key length in approximately 2128 iterations. This algorithm is a quantum algorithm with complexity O(√N ), where N is the domain size of the function. For the case of a 1024-bit key, Grover’s algorithm could brutally force AES into approximately 2512 iterations. However, this big AES would avoid quantum attacks and its S-Box can be construct using the proposed theorem. Indeed, we can use this technique in every block cipher. In addition, we obtain a numerical sequence consisting of the number of n × n B-Ramanujan matrices. The relevance of Ramanujan graphs applied in cryptography motivated our study in the search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo proposed a key-agreement isogeny-based algorithm supposed to be resistant to quantum attacks. It is based on supersingular isogeny (Ramanujan) graph walks. Recently, the Supersingular Isogeny Key Encapsulation (SIKE) reached the fourth round of the NIST’s standardization process on post-quantum cryptography. However, these algorithms were attacked by Wouter Castryck and Thomas Decru with Kani’s theorem a few months ago. This attack does not threaten all cryptosystems based on isogeny graphs. In the first half of 2022, we propose a SIKE- like considering the degrees of isogenies in the encryption and decryption process. Our SIKE-like is additive homomorphic. The recent attack on SIKE exposed vulnerability in our algorithm only in the explicit part about the degrees of isogenies. We are analyzing the attack to propose a version resistant to the current attack.Os grafos de Ramanujan são ótimos grafos expansores, estes grafos são esparsos e têm propriedades muito importantes, como diâmetro baixo, alta conectividade e alto número cromático. Estes grafos também são aplicados às cifras de bloco, como o Advanced Encryption Standard (AES). Grande parte da segurança do AES está presente em sua Substitution-Box (S-Box), da mesma forma que outras cifras de bloco. Na literatura, vários métodos têm sido propostos para criar S-Boxes fortes para o AES. Uma S-Box forte deve satisfazer várias propriedades criptográficas para resistir às criptoanálises linear e diferencial. Uma S-Box é uma função Booleana. Se uma função Booleana é bent, então sua S-Box associada tem não linearidade máxima, uma propriedade criptográfica relevante para construção de S-Boxes resistentes à criptoanálise linear. O grafo de Ramanujan está relacionado às funções bent, ou seja, um grafo de Cayley associado a uma função bent é sempre um grafo de Ramanujan. Embora a S-Box do AES não seja bent, identificamos que sua matriz circulante, na etapa subbytes do AES, é uma matriz de adjacência de um grafo Ramanujan e propomos um algoritmo para verificar a relação encontrada. Propomos um teorema e demonstramos a relação entre o grafo de Ramanujan e a matriz circulante usada no AES. Definimos uma matriz B-Ramanujan como uma matriz {0, 1}-circulante de adjacência do grafo de Ramanujan. Também verificamos que as matrizes B-Ramanujan garantem S-Boxes fortes. Para o caso de AES-256, devemos escolher uma matriz em um conjunto com aproximadamente 1018 matrizes binárias não singulares. No entanto, nosso resultado reduz a busca a um conjunto de 247 matrizes B-Ramanujan, onde somente 152 são não singulares. O algoritmo de Grover poderia atacar o AES com um comprimento de chave de 256 bits em aproximadamente 2128 iterações. Este algoritmo é um algoritmo quântico com complexidade O(√N ), onde N é o tamanho do domínio da função. Para o caso de uma chave de 1024 bits, o algoritmo de Grover poderia forçar brutalmente o AES em aproximadamente 2512 iterações. No entanto, este AES com tamanho de chave maior evitaria ataques quânticos e sua S-Box pode ser construída usando o teorema proposto. De fato, podemos usar essa técnica em todas as cifras de bloco. Além disso, obtemos uma sequência numérica que consiste no número de matrizes n × n B-Ramanujan. A relevância dos grafos de Ramanujan aplicados à criptografia motivou nosso estudo na busca por um algoritmo pós-quântico e homomórfico baseado em tais grafos. Em 2011, Jao e De Feo propuseram um algoritmo de acordo de chave baseado em isogenia, supostamente resistente a ataques quânticos. Este algoritmo baseia-se em caminhos nos grafos de isogenias supersingulares (Ramanujan). Recentemente, o Supersingular Isogeny Key Encapsulation (SIKE) alcançou a quarta rodada do processo de padronização do NIST em criptografia pós-quântica. No entanto, esses algoritmos foram atacados por Wouter Castryck e Thomas Decru com o teorema de Kani alguns meses atrás. Este ataque não ameaça todos os criptosistemas baseados em grafos de isogenia. No primeiro semestre de 2022, propomos um SIKE-like considerando os graus de isogenias no processo de encriptação e decriptação. Nosso SIKE-like é homomórfico aditivo. O recente ataque ao SIKE expôs a vulnerabilidade em nosso algoritmo somente na parte explícita sobre os graus das isogenias. Estamos analisando o ataque para propormos uma versão resistente a ele.Laboratório Nacional de Computação CientíficaCoordenação de Pós-Graduação e Aperfeiçoamento (COPGA)BrasilLNCCPrograma de Pós-Graduação em Modelagem ComputacionalOliveira, Fábio Borges deOliveira, Fábio Borges dePortugal, RenatoMachado, Raphael Carlos SantosMartucci, Leonardo AugustoBelleza, Marcio Prudêncio2023-05-03T14:12:14Z2023-01-27info:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/doctoralThesisapplication/pdfBELLEZA, M. P. Cryptographic algorithms based on Ramanujan graphs. 2023. 84 f. Tese (Programa de Pós-Graduação em Modelagem Computacional) - Laboratório Nacional de Computação Científica, Petrópolis, 2023.https://tede.lncc.br/handle/tede/367enghttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/openAccessreponame:Biblioteca Digital de Teses e Dissertações do LNCCinstname:Laboratório Nacional de Computação Científica (LNCC)instacron:LNCC2023-05-04T04:32:43Zoai:tede-server.lncc.br:tede/367Biblioteca Digital de Teses e Dissertaçõeshttps://tede.lncc.br/PUBhttps://tede.lncc.br/oai/requestlibrary@lncc.br||library@lncc.bropendoar:2023-05-04T04:32:43Biblioteca Digital de Teses e Dissertações do LNCC - Laboratório Nacional de Computação Científica (LNCC)false
dc.title.none.fl_str_mv Cryptographic algorithms based on Ramanujan graphs
title Cryptographic algorithms based on Ramanujan graphs
spellingShingle Cryptographic algorithms based on Ramanujan graphs
Belleza, Marcio Prudêncio
Criptografia
Criptografia de dados (Computação)
Grafos Ramanujan
Teoria dos grafos
Matrizes (Matemática)
CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAO
title_short Cryptographic algorithms based on Ramanujan graphs
title_full Cryptographic algorithms based on Ramanujan graphs
title_fullStr Cryptographic algorithms based on Ramanujan graphs
title_full_unstemmed Cryptographic algorithms based on Ramanujan graphs
title_sort Cryptographic algorithms based on Ramanujan graphs
author Belleza, Marcio Prudêncio
author_facet Belleza, Marcio Prudêncio
author_role author
dc.contributor.none.fl_str_mv Oliveira, Fábio Borges de
Oliveira, Fábio Borges de
Portugal, Renato
Machado, Raphael Carlos Santos
Martucci, Leonardo Augusto
dc.contributor.author.fl_str_mv Belleza, Marcio Prudêncio
dc.subject.por.fl_str_mv Criptografia
Criptografia de dados (Computação)
Grafos Ramanujan
Teoria dos grafos
Matrizes (Matemática)
CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAO
topic Criptografia
Criptografia de dados (Computação)
Grafos Ramanujan
Teoria dos grafos
Matrizes (Matemática)
CNPQ::CIENCIAS EXATAS E DA TERRA::CIENCIA DA COMPUTACAO::METODOLOGIA E TECNICAS DA COMPUTACAO
description Ramanujan graphs are optimal expanders, and expander graphs are sparse graphs that have very important properties such as low diameter, high connectivity, and high chromatic number. These graphs are also applied to block ciphers, such as Advanced Encryption Standard (AES). Much of the security of AES is present in its Substitution-Box (S- Box), in the same way that other block ciphers. In the literature, several methods have been proposed to create strong S-Boxes for AES. A strong S-Box should satisfy several cryptographic properties to resist linear and differential cryptanalysis. An S-Box is a Boolean function. If a Boolean function is bent, then its S-Box associated has maximum nonlinearity, a relevant cryptographic property for construction of S-Boxes resistant to linear cryptanalysis. Ramanujan graph is related to bent functions, namely, a Cayley graph associated with bent function is always a Ramanujan graph. Although, the AES S-Box is not bent, we identified that its circulant matrix in the subbytes is an adjacency matrix of a Ramanujan graph and propose an algorithm to verify the relationship found. We proposed a theorem and demonstrated the relationship between the Ramanujan graph and the circulant matrix used in AES. We define a B-Ramanujan matrix as a {0, 1}-circulant adjacency matrix of a Ramanujan graph. We also verified that B-Ramanujan matrices guarantee strong S-Boxes. For the case of AES-256, we should choose a matrix in a set with approximately 1018 nonsingular binary matrices. However, our result reduces the search to a set of 247 B-Ramanujan matrices, where only 152 are nonsingular. Grover’s Algorithm could attack AES with a 256-bit key length in approximately 2128 iterations. This algorithm is a quantum algorithm with complexity O(√N ), where N is the domain size of the function. For the case of a 1024-bit key, Grover’s algorithm could brutally force AES into approximately 2512 iterations. However, this big AES would avoid quantum attacks and its S-Box can be construct using the proposed theorem. Indeed, we can use this technique in every block cipher. In addition, we obtain a numerical sequence consisting of the number of n × n B-Ramanujan matrices. The relevance of Ramanujan graphs applied in cryptography motivated our study in the search for a post-quantum and homomorphic algorithm based on such graphs. In 2011, Jao and De Feo proposed a key-agreement isogeny-based algorithm supposed to be resistant to quantum attacks. It is based on supersingular isogeny (Ramanujan) graph walks. Recently, the Supersingular Isogeny Key Encapsulation (SIKE) reached the fourth round of the NIST’s standardization process on post-quantum cryptography. However, these algorithms were attacked by Wouter Castryck and Thomas Decru with Kani’s theorem a few months ago. This attack does not threaten all cryptosystems based on isogeny graphs. In the first half of 2022, we propose a SIKE- like considering the degrees of isogenies in the encryption and decryption process. Our SIKE-like is additive homomorphic. The recent attack on SIKE exposed vulnerability in our algorithm only in the explicit part about the degrees of isogenies. We are analyzing the attack to propose a version resistant to the current attack.
publishDate 2023
dc.date.none.fl_str_mv 2023-05-03T14:12:14Z
2023-01-27
dc.type.status.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.driver.fl_str_mv info:eu-repo/semantics/doctoralThesis
format doctoralThesis
status_str publishedVersion
dc.identifier.uri.fl_str_mv BELLEZA, M. P. Cryptographic algorithms based on Ramanujan graphs. 2023. 84 f. Tese (Programa de Pós-Graduação em Modelagem Computacional) - Laboratório Nacional de Computação Científica, Petrópolis, 2023.
https://tede.lncc.br/handle/tede/367
identifier_str_mv BELLEZA, M. P. Cryptographic algorithms based on Ramanujan graphs. 2023. 84 f. Tese (Programa de Pós-Graduação em Modelagem Computacional) - Laboratório Nacional de Computação Científica, Petrópolis, 2023.
url https://tede.lncc.br/handle/tede/367
dc.language.iso.fl_str_mv eng
language eng
dc.rights.driver.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
info:eu-repo/semantics/openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
eu_rights_str_mv openAccess
dc.format.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Laboratório Nacional de Computação Científica
Coordenação de Pós-Graduação e Aperfeiçoamento (COPGA)
Brasil
LNCC
Programa de Pós-Graduação em Modelagem Computacional
publisher.none.fl_str_mv Laboratório Nacional de Computação Científica
Coordenação de Pós-Graduação e Aperfeiçoamento (COPGA)
Brasil
LNCC
Programa de Pós-Graduação em Modelagem Computacional
dc.source.none.fl_str_mv reponame:Biblioteca Digital de Teses e Dissertações do LNCC
instname:Laboratório Nacional de Computação Científica (LNCC)
instacron:LNCC
instname_str Laboratório Nacional de Computação Científica (LNCC)
instacron_str LNCC
institution LNCC
reponame_str Biblioteca Digital de Teses e Dissertações do LNCC
collection Biblioteca Digital de Teses e Dissertações do LNCC
repository.name.fl_str_mv Biblioteca Digital de Teses e Dissertações do LNCC - Laboratório Nacional de Computação Científica (LNCC)
repository.mail.fl_str_mv library@lncc.br||library@lncc.br
_version_ 1832738028412469248