Advanced MST3 Encryption scheme based on generalized Suzuki 2-groups
- URL: http://arxiv.org/abs/2504.11804v1
- Date: Wed, 16 Apr 2025 06:32:45 GMT
- Title: Advanced MST3 Encryption scheme based on generalized Suzuki 2-groups
- Authors: Gennady Khalimov, Yevgen Kotukh,
- Abstract summary: This article presents a method for enhancing the encryption algorithm in the MST3 cryptosystem for generalized Suzuki 2-groups.<n>In our approach, the logarithmic signature extends across the entire group, with cipher security dependent on the group order.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This article presents a method for enhancing the encryption algorithm in the MST3 cryptosystem for generalized Suzuki 2-groups. The conventional MST cryptosystem based on Suzuki groups utilizes logarithmic signatures (LS) restricted to the center of the group, resulting in an expansive array of logarithmic signatures. We propose an encryption scheme based on multi-parameter non-commutative groups, specifically selecting multi-parameter generalized Suzuki 2-groups as the group construction framework. In our approach, the logarithmic signature extends across the entire group, with cipher security dependent on the group order. This design enables the development of encryption optimized for implementation efficiency determined by logarithmic signature size while maintaining robust security through appropriate key sizes and the finite field of group representation. The primary innovation in our encryption implementation lies in the sequential de-encapsulation of keys from ciphertext using logarithmic signatures and associated keys. The security evaluation of the cipher relies on attack complexity analysis, which is quantified through comprehensive key enumeration methodologies.
Related papers
- Secured Encryption scheme based on the Ree groups [0.0]
An improved design of a cryptosystem based on small Ree groups is proposed.
We have changed the encryption algorithm and propose to use a logarithmic signature for the entire Ree group.
arXiv Detail & Related papers (2025-04-24T20:21:02Z) - MST3 Encryption improvement with three-parameter group of Hermitian function field [0.0]
This work presents an advanced cryptographic framework utilizing automorphism groups as the foundational structure for encryption scheme implementation.
A key innovation in this implementation is utilizing the Hermitian function field as the underlying mathematical framework.
The encryption mechanism features phased key de-encapsulation from ciphertext, representing a substantial advantage over alternative implementations.
arXiv Detail & Related papers (2025-04-21T18:58:42Z) - Improved MST3 Encryption scheme based on small Ree groups [0.0]
This article presents an encryption scheme based on the small Ree groups.<n>We propose utilizing the small Ree group structure to enhance the overall security parameters of the encryption scheme.
arXiv Detail & Related papers (2025-04-15T07:51:56Z) - Encryption scheme based on Automorphism Group of Hermitian Function Field with Homomorphic Encryption [0.0]
We enhance the Hermitian function field-based encryption scheme with homomorphic encryption capabilities.<n>Both the attack complexity and the encrypted message size are directly correlated with the order of the group.
arXiv Detail & Related papers (2025-04-14T22:39:40Z) - Cryptographic Strengthening of MST3 cryptosystem via Automorphism Group of Suzuki Function Fields [0.0]
The article describes a new implementation of MST3 cryptosystems based on the automorphism group of the Suzuki function field.<n>The complexity of cryptanalysis and the size of the message for encryption squared is higher than that of the MST3 cryptosystem in the Suzuki group.
arXiv Detail & Related papers (2025-04-09T22:37:08Z) - Cryptanalysis via Machine Learning Based Information Theoretic Metrics [58.96805474751668]
We propose two novel applications of machine learning (ML) algorithms to perform cryptanalysis on any cryptosystem.<n>These algorithms can be readily applied in an audit setting to evaluate the robustness of a cryptosystem.<n>We show that our classification model correctly identifies the encryption schemes that are not IND-CPA secure, such as DES, RSA, and AES ECB, with high accuracy.
arXiv Detail & Related papers (2025-01-25T04:53:36Z) - Symmetric Encryption Scheme Based on Quasigroup Using Chained Mode of Operation [1.4249472316161877]
We propose a novel construction for a symmetric encryption scheme, referred as SEBQ.
We utilize concepts of chaining like mode of operation and present a block cipher with in-built properties.
arXiv Detail & Related papers (2024-08-08T14:39:51Z) - An encryption algorithm using a generalization of the Markovski algorithm and a system of orthogonal operations based on T-quasigroups [45.67330863443465]
We present an implementation of this algorithm based on T-quasigroups, more precisely, based on medial quasigroups.
In this paper, we present an implementation of this algorithm based on T-quasigroups, more precisely, based on medial quasigroups.
arXiv Detail & Related papers (2024-07-20T12:38:07Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - PassGPT: Password Modeling and (Guided) Generation with Large Language
Models [59.11160990637616]
We present PassGPT, a large language model trained on password leaks for password generation.
We also introduce the concept of guided password generation, where we leverage PassGPT sampling procedure to generate passwords matching arbitrary constraints.
arXiv Detail & Related papers (2023-06-02T13:49:53Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.