Publications

Detailed Information

Post-Quantum Cryptography and Multivariate Public Key Cryptosystem : 양자컴퓨터에 안전한 암호 알고리즘과 다변수다항식 공개키 암호체계

DC Field Value Language
dc.contributor.advisorDavid Donghoon Hyeon-
dc.contributor.author김준환-
dc.date.accessioned2018-05-29T05:07:58Z-
dc.date.available2018-05-29T05:07:58Z-
dc.date.issued2018-02-
dc.identifier.other000000150842-
dc.identifier.urihttps://hdl.handle.net/10371/142453-
dc.description학위논문 (석사)-- 서울대학교 대학원 : 자연과학대학 수리과학부, 2018. 2. David Donghoon Hyeon.-
dc.description.abstractThe emergence of quantum computer is now becoming
a threat to current cryptosystem. Earlier, Shor proved
that widely used RSA public key cryptosystem can be
solved in polynomial time by quantum computation
algorithm, which makes us consider the safety of other
existing cryptosystems known to be safe for classical
computer algorithm. This paper presents mathematical
and systematic explanations of the relation between
quantum computation and cryptographic security,
briefly examines the safety of existing cryptosystems
and reviews the efficiency and security of several
multivariate polynomial-based cryptosystems(MPKC)
with implementation of Matsumoto-Imai Cryptosystem
on computer. As a result, it has been shown that
MPKC is efficient under limited computing power.
However, it has been also found that the research on
the compatibility as a post-quantum cryptosystem and
the security against the other threats are still
insufficient. Therefore we conclude that MPKC should
be studied with persistent interest.
-
dc.description.tableofcontents1 Introduction 1
1.1 Public Key Cryptosystems 1
1.2 Multivariate Public Key Cryptosystems 2
1.3 The classication of MPKC 3
1.3.1 Bipolar Systems 3
1.3.2 Mixed Systems 4
1.3.3 IP Scheme 5
2 Quantum Computation and MPKC 7
2.1 Quantum Computaton 7
2.2 The Quantum Fourier Transform 8
2.3 The hidden subgroup problem 11
2.3.1 The abelian HSP 13
2.3.2 The nonabelian HSP 14
3 Matsumoto-Imai Cryptosystems 17
3.1 Description of a Matsumoto-Imai System 17
3.2 Linearlization Attack 19
3.3 Implementation of MI 22
3.4 Variants of MI 27
3.4.1 The Minus Method 27
3.4.2 The Plus Method 28
4 Oil-Vinegar Signature Schemes 31
4.1 Description of The Basic Oil-Vinegar Signature Scheme 32
4.2 Security of Oil-Vinegar Signature Scheme 33
4.3 Rainbow 34
4.4 Security of Rainbow 37
5 Conclusion 39
-
dc.formatapplication/pdf-
dc.format.extent594088 bytes-
dc.format.mediumapplication/pdf-
dc.language.isoen-
dc.publisher서울대학교 대학원-
dc.subjectpublic key cryptography-
dc.subjectquantum computation-
dc.subjectpost-quantum cryptography-
dc.subjectMI cryptosystem-
dc.subjectOil-Vinegar signature scheme-
dc.subjectRainbow-
dc.subjectmultivariate-polynomial-
dc.subject.ddc510-
dc.titlePost-Quantum Cryptography and Multivariate Public Key Cryptosystem-
dc.title.alternative양자컴퓨터에 안전한 암호 알고리즘과 다변수다항식 공개키 암호체계-
dc.typeThesis-
dc.description.degreeMaster-
dc.contributor.affiliation자연과학대학 수리과학부-
dc.date.awarded2018-02-
Appears in Collections:
Files in This Item:

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share