Group Theoretic Cryptography


Book Description

Group theory appears to be a promising source of hard computational problems for deploying new cryptographic constructions. This reference focuses on the specifics of using groups, including in particular non-Abelian groups, in the field of cryptography. It provides an introduction to cryptography with emphasis on the group theoretic perspective, making it one of the first books to use this approach. The authors provide the needed cryptographic and group theoretic concepts, full proofs of essential theorems, and formal security evaluations of the cryptographic schemes presented. They also provide references for further reading and exercises at the end of each chapter.




Group-based Cryptography


Book Description

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It is explored how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public key cryptography. It is also shown that there is a remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. Then, complexity theory, notably generic-case complexity of algorithms, is employed for cryptanalysis of various cryptographic protocols based on infinite groups, and the ideas and machinery from the theory of generic-case complexity are used to study asymptotically dominant properties of some infinite groups that have been applied in public key cryptography so far. Its elementary exposition makes the book accessible to graduate as well as undergraduate students in mathematics or computer science.




Interactions between Group Theory, Symmetry and Cryptology


Book Description

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.




Group Theory, Statistics, and Cryptography


Book Description

This volume consists of contributions by speakers at the AMS Special Session on Combinatorial and Statistical Group Theory held at New York University. Readers will find a variety of contributions, including survey papers on applications of group theory in cryptography, research papers on various aspects of statistical group theory, and papers on more traditional combinatorial group theory. The book is suitable for graduate students and research mathematicians interested in group theory and its applications to cryptography.







Non-commutative Cryptography and Complexity of Group-theoretic Problems


Book Description

Examines the relationship between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups can be used in public key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory.




Non-commutative Cryptography and Complexity of Group-theoretic Problems


Book Description

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial group theory, cryptography, and complexity theory. It explores how non-commutative (infinite) groups, which are typically studied in combinatorial group theory, can be used in public-key cryptography. It also shows that there is remarkable feedback from cryptography to combinatorial group theory because some of the problems motivated by cryptography appear to be new to group theory, and they open many interesting research avenues within group theory. In particular, a lot of emphasis in the book is put on studying search problems, as compared to decision problems traditionally studied in combinatorial group theory.




Groups, Matrices, and Vector Spaces


Book Description

This unique text provides a geometric approach to group theory and linear algebra, bringing to light the interesting ways in which these subjects interact. Requiring few prerequisites beyond understanding the notion of a proof, the text aims to give students a strong foundation in both geometry and algebra. Starting with preliminaries (relations, elementary combinatorics, and induction), the book then proceeds to the core topics: the elements of the theory of groups and fields (Lagrange's Theorem, cosets, the complex numbers and the prime fields), matrix theory and matrix groups, determinants, vector spaces, linear mappings, eigentheory and diagonalization, Jordan decomposition and normal form, normal matrices, and quadratic forms. The final two chapters consist of a more intensive look at group theory, emphasizing orbit stabilizer methods, and an introduction to linear algebraic groups, which enriches the notion of a matrix group. Applications involving symm etry groups, determinants, linear coding theory and cryptography are interwoven throughout. Each section ends with ample practice problems assisting the reader to better understand the material. Some of the applications are illustrated in the chapter appendices. The author's unique melding of topics evolved from a two semester course that he taught at the University of British Columbia consisting of an undergraduate honors course on abstract linear algebra and a similar course on the theory of groups. The combined content from both makes this rare text ideal for a year-long course, covering more material than most linear algebra texts. It is also optimal for independent study and as a supplementary text for various professional applications. Advanced undergraduate or graduate students in mathematics, physics, computer science and engineering will find this book both useful and enjoyable.




Interactions between Group Theory, Symmetry and Cryptology


Book Description

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.




Computational and Combinatorial Group Theory and Cryptography


Book Description

This volume contains the proceedings of the AMS Special Session on Computational Algebra, Groups, and Applications, held April 30-May 1, 2011, at the University of Nevada, Las Vegas, Nevada, and the AMS Special Session on the Mathematical Aspects of Cryptography and Cyber Security, held September 10-11, 2011, at Cornell University, Ithaca, New York. Over the past twenty years combinatorial and infinite group theory has been energized by three developments: the emergence of geometric and asymptotic group theory, the development of algebraic geometry over groups leading to the solution of the Tarski problems, and the development of group-based cryptography. These three areas in turn have had an impact on computational algebra and complexity theory. The papers in this volume, both survey and research, exhibit the tremendous vitality that is at the heart of group theory in the beginning of the twenty-first century as well as the diversity of interests in the field.