Type of Document Dissertation Author Rai, Tapan S Author's Email Address firstname.lastname@example.org URN etd-03262004-082608 Title Infinite Groebner Bases And Noncommutative Polly Cracker Cryptosystems Degree PhD Department Mathematics Advisory Committee
Advisor Name Title Green, Edward L. Committee Chair Brown, Ezra A. Committee Member Haskell, Peter E. Committee Member Linnell, Peter A. Committee Member Rossi, John F. Committee Member Keywords
- Computational Algebra
- Public Key Cryptography
- Noncommutative Groebner Bases
- Information Security
- Polly Cracker
Date of Defense 2004-03-23 Availability unrestricted AbstractWe develop a public key cryptosystem whose security is based on the intractability of the ideal membership problem for a noncommutative algebra over a finite field. We show that this system, which is the noncommutative analogue of the Polly Cracker cryptosystem, is more secure than the commutative version. This is due to the fact that there are a number of ideals of noncommutative algebras (over finite fields) that have infinite reduced Groebner bases, and can be used to generate a public key. We present classes of such ideals and prove that they do not have a finite Groebner basis under any admissible order. We also examine various techniques to realize finite Groebner bases, in order to determine whether these ideals can be used effectively in the design of a public key cryptosystem.
We then show how some of these classes of ideals, which have infinite reduced Groebner bases, can be used to design a public key cryptosystem. We also study various techniques of encryption. Finally, we study techniques of cryptanalysis that may be used to attack the cryptosystems that we present. We show how poorly constructed public keys can in fact, reveal the private key, and discuss techniques to design public keys that adequately conceal the private key. We also show how linear algebra can be used in ciphertext attacks and present a technique to overcome such attacks. This is different from the commutative version of the Polly Cracker cryptosystem, which is believed to be susceptible to "intelligent" linear algebra attacks.
Filename Size Approximate Download Time (Hours:Minutes:Seconds)
28.8 Modem 56K Modem ISDN (64 Kb) ISDN (128 Kb) Higher-speed Access rai_etd.pdf 501.95 Kb 00:02:19 00:01:11 00:01:02 00:00:31 00:00:02
If you have questions or technical problems, please Contact DLA.