Showing 1–3 of 3 results for author: Roellgen, C
-
QRKE: Resistance to Attacks using the Inverse of the Cosine Representation of Chebyshev Polynomials
Authors:
G. Brands,
C. B. Roellgen,
K. U. Vogel
Abstract:
We've been able to show recently that Permutable Chebyshev polynomials (T polynomials) defined over the field of real numbers can be used to create a Diffie-Hellman-like key exchange algorithm and certificates. The cryptosystem was theoretically proven to withstand attacks using quantum computers. We additionally prove that attacks based on the inverse of the cosine representation of T polynomials…
▽ More
We've been able to show recently that Permutable Chebyshev polynomials (T polynomials) defined over the field of real numbers can be used to create a Diffie-Hellman-like key exchange algorithm and certificates. The cryptosystem was theoretically proven to withstand attacks using quantum computers. We additionally prove that attacks based on the inverse of the cosine representation of T polynomials fail.
△ Less
Submitted 19 January, 2018; v1 submitted 27 January, 2016;
originally announced January 2016.
-
QRKE: Extensions
Authors:
G. Brands,
C. B. Roellgen,
K. U. Vogel
Abstract:
Permutable Chebyshev polynomials (T polynomials) defined over the field of real numbers are suitable for creating a Diffie-Hellman-like key exchange algorithm that is able to withstand attacks using quantum computers. The algorithm takes advantage of the commutative properties of Chebyshev polynomials of the first kind. We show how T polynomial values can be computed faster and how the underlying…
▽ More
Permutable Chebyshev polynomials (T polynomials) defined over the field of real numbers are suitable for creating a Diffie-Hellman-like key exchange algorithm that is able to withstand attacks using quantum computers. The algorithm takes advantage of the commutative properties of Chebyshev polynomials of the first kind. We show how T polynomial values can be computed faster and how the underlying principle can further be used to create public key encryption methods, as well as certificate-like authentication-, and signature schemes.
△ Less
Submitted 19 January, 2018; v1 submitted 30 November, 2015;
originally announced November 2015.
-
QRKE: Quantum-Resistant Public Key Exchange
Authors:
G. Brands,
C. B. Roellgen,
K. U. Vogel
Abstract:
A Post-Quantum Key Exchange is needed since the availability of quantum computers that allegedly allow breaking classical algorithms like Diffie-Hellman, El Gamal, RSA and others within a practical amount of time is broadly assumed in literature. Although our survey suggests that practical quantum computers appear to be by far less advanced as actually required to break state-of-the-art key negoti…
▽ More
A Post-Quantum Key Exchange is needed since the availability of quantum computers that allegedly allow breaking classical algorithms like Diffie-Hellman, El Gamal, RSA and others within a practical amount of time is broadly assumed in literature. Although our survey suggests that practical quantum computers appear to be by far less advanced as actually required to break state-of-the-art key negotiation algorithms, it is of high scientific interest to develop fundamentally immune key negotiation methods. A novel polymorphic algorithm based on permutable functions and defined over the field of real numbers is proposed. The proposed key exchange can operate with at least four different strategies. The cryptosystem itself is highly variable and, due to the fact that rounding operations are inevitable and mandatory on a traditional computer system, decoherence of the quantum computer system would lead to a premature end of the computation on quantum systems.
△ Less
Submitted 19 January, 2018; v1 submitted 26 October, 2015;
originally announced October 2015.