• Breaking News

    Monday, December 31, 2018

    Cryptography 35c3 - No evidence of communication and morality in protocols: Off-the-Record protocol version 4

    Cryptography 35c3 - No evidence of communication and morality in protocols: Off-the-Record protocol version 4


    35c3 - No evidence of communication and morality in protocols: Off-the-Record protocol version 4

    Posted: 30 Dec 2018 03:52 PM PST

    Understanding the CSIDH protocol. [Post quantum cryptography]

    Posted: 30 Dec 2018 03:40 PM PST

    Hi all. I am trying to understand the CSIDH protocol (https://www.cs.ru.nl/~jrenes/publications/csidh.pdf page 16) and there is something that I am not getting right. For the setup, we will work in F_p with p=3 mod 8.

    In short, we consider the elliptic curve E0: y^2 = x^3 + x and its Endomorphism Ring Z[pi], which is an order O in Q[Pi]. Also, there's a nice action of Cl(O) over Ell_p(O) such that [a]E = E_a, i.e. it gives us the curve with kernel = [a].

    Facts we know:

    1. Every curve E_a: y^2 = x^3 + ax^2 + x that is supersingular is then in the Cl(O)-orbit of E0.
    2. Considering the action, we have that End(E)=End([a]E), meaning that it remains the same under the action.
    3. If E/F_p is supersingular curve, then End_p(E) = Z[pi] if and only if it can be expressed in the y^2 = x^3+Ax^2+x form for some A. (That is the Montgomery form)

    The protocol is as follows:

    Both Alice and Bob starts with E0 as the initial curve which I will denote with E.

    1. Bob chooses an ideal [B] of Cl(O) an computes the action [B]E which gives y^2 = x^3+Bx^2+x for some B. Sends B to Alice.
    2. The pdf states that Alice has to check out if [B]E is indeed in Ell_p(O), and if so, then compute [A] ( [B]E0 ). The question is: why do we have to check if [B]E is indeed in Ell_p(O)?

    In trying to do so, Alice first checks with an algorithm (which I won't specify here) whether or not [B]E is supersingular. If it finally is supersingular, then she proceeds. Why? I don't see how being supersingular implies that [B]E falls into Ell_p(O). What I do see is that, from fact 1, it is in the Cl(O)-orbit of E0. But we already knew that. And also, because of fact 2, E and [B]E have the same End_p(E) (so that would automatically imply they are both in Ell_p(O)?), that fact plus being supersingular gives that [B]E has Montgomery form, because of fact 3. But didn't Bob already sent a curve in Montgomery form?

    1. Bob does the same and applies [B] to [A]E, which Alice sent to him. But first he does the same check process.

    2. Since Cl(O) is commutative, and since Montgomery form has unique coefficient A, they both now have a curve y^2 = x^3 + Sx^2 + x. So S is the shared secret key.

    I think I understand the big picture, at the end it's based in a Diffie Hellman protocol, but I am very confused about step 2 and why do they have to do that process.

    Any help or insight about this doubt will be highly appreciated, thanks.

    PS: Extra question. Previously to that, it says that we are interested in ideals L of Cl(O) that split in O, i.e. LO=(l,pi-lambda)(l,pi+lambda). Why? I think it has to do with splitting isogeny into several isogenies but I can't see it clear. I understand that (l , pi - lambda) are the points of order l that have coordinates in Fp.

    submitted by /u/AiYagami
    [link] [comments]

    Linear transformations as perfect hashing functions

    Posted: 30 Dec 2018 10:09 AM PST

    Hey all, I "discovered" something interesting I would like to learn more about, figured this would be a good place to ask.

    Take a square matrix initialized with arbitrary positive integers, and treat this linear transformation as your hash function. In the test I did, I hashed the values of 0-99 into a hash table of length 100 using a linear transformation as just described. It was a "perfect hash", where each unique integer was mapped to some unique index (this was not a trivial mapping where 1 was mapped to index 1 and so on). I treated each input number as an vector, for example 51 is (0, 5, 1).

    It turns out that if you randomly initialize the matrix with positive integers, some subset of the matrices will be a perfect hashes and the rest will not. This is about as far as I have looked, and I am wondering if any of you know of any research I could read up on that goes more into this phenomena? I unfortunately have no formal education on this subject so sorry if this is already common knowledge.

    submitted by /u/InsaneRaspberry
    [link] [comments]

    35C3 - Memsad why clearing memory is hard.

    Posted: 30 Dec 2018 05:58 PM PST

    The year in post-quantum crypto

    Posted: 30 Dec 2018 03:47 AM PST

    No comments:

    Post a Comment