Publications
Detailed Information
Post-Quantum Cryptography and Multivariate Public Key Cryptosystem : 양자컴퓨터에 안전한 암호 알고리즘과 다변수다항식 공개키 암호체계
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | David Donghoon Hyeon | - |
dc.contributor.author | 김준환 | - |
dc.date.accessioned | 2018-05-29T05:07:58Z | - |
dc.date.available | 2018-05-29T05:07:58Z | - |
dc.date.issued | 2018-02 | - |
dc.identifier.other | 000000150842 | - |
dc.identifier.uri | https://hdl.handle.net/10371/142453 | - |
dc.description | 학위논문 (석사)-- 서울대학교 대학원 : 자연과학대학 수리과학부, 2018. 2. David Donghoon Hyeon. | - |
dc.description.abstract | The emergence of quantum computer is now becoming
a threat to current cryptosystem. Earlier, Shor proved that widely used RSA public key cryptosystem can be solved in polynomial time by quantum computation algorithm, which makes us consider the safety of other existing cryptosystems known to be safe for classical computer algorithm. This paper presents mathematical and systematic explanations of the relation between quantum computation and cryptographic security, briefly examines the safety of existing cryptosystems and reviews the efficiency and security of several multivariate polynomial-based cryptosystems(MPKC) with implementation of Matsumoto-Imai Cryptosystem on computer. As a result, it has been shown that MPKC is efficient under limited computing power. However, it has been also found that the research on the compatibility as a post-quantum cryptosystem and the security against the other threats are still insufficient. Therefore we conclude that MPKC should be studied with persistent interest. | - |
dc.description.tableofcontents | 1 Introduction 1
1.1 Public Key Cryptosystems 1 1.2 Multivariate Public Key Cryptosystems 2 1.3 The classication of MPKC 3 1.3.1 Bipolar Systems 3 1.3.2 Mixed Systems 4 1.3.3 IP Scheme 5 2 Quantum Computation and MPKC 7 2.1 Quantum Computaton 7 2.2 The Quantum Fourier Transform 8 2.3 The hidden subgroup problem 11 2.3.1 The abelian HSP 13 2.3.2 The nonabelian HSP 14 3 Matsumoto-Imai Cryptosystems 17 3.1 Description of a Matsumoto-Imai System 17 3.2 Linearlization Attack 19 3.3 Implementation of MI 22 3.4 Variants of MI 27 3.4.1 The Minus Method 27 3.4.2 The Plus Method 28 4 Oil-Vinegar Signature Schemes 31 4.1 Description of The Basic Oil-Vinegar Signature Scheme 32 4.2 Security of Oil-Vinegar Signature Scheme 33 4.3 Rainbow 34 4.4 Security of Rainbow 37 5 Conclusion 39 | - |
dc.format | application/pdf | - |
dc.format.extent | 594088 bytes | - |
dc.format.medium | application/pdf | - |
dc.language.iso | en | - |
dc.publisher | 서울대학교 대학원 | - |
dc.subject | public key cryptography | - |
dc.subject | quantum computation | - |
dc.subject | post-quantum cryptography | - |
dc.subject | MI cryptosystem | - |
dc.subject | Oil-Vinegar signature scheme | - |
dc.subject | Rainbow | - |
dc.subject | multivariate-polynomial | - |
dc.subject.ddc | 510 | - |
dc.title | Post-Quantum Cryptography and Multivariate Public Key Cryptosystem | - |
dc.title.alternative | 양자컴퓨터에 안전한 암호 알고리즘과 다변수다항식 공개키 암호체계 | - |
dc.type | Thesis | - |
dc.description.degree | Master | - |
dc.contributor.affiliation | 자연과학대학 수리과학부 | - |
dc.date.awarded | 2018-02 | - |
- Appears in Collections:
- Files in This Item:
Item View & Download Count
Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.