Skip to main content

Featured Post

Ed Scheidts Mayan Symbols - Can we solve the puzzle?

In this post I want to talk about a thing from the Kryptos universe that are not directly related to the statue. But i think it may be an indirect hint to some Kryptos related methods. The Mayan Symbols in Ed Scheidts driveway I think everyone who knows Kryptos knows Ed Scheidt. The former Chairman of the Cryptographic Center at the CIA and founder of the cryptosystems used around the Kryptos statue. As already shown in Part 4 of my Kryptos series, in the driveway of Ed Scheidts house, there are two symbols: Figure 1 - Garage driveway of Ed Scheidt We denote the left symbol set with $S_1$ and the right one with $S_2$. It took me a while to find his house on Google Maps - Street View. To save you some time, here is the link with a view on the driveway. I you go back in time in Streetview, you can see that the symbols were already there in 2012. But it is impossible to say when they were built. $S_1$ is clearly visible from the street, $S_2$ is hidden in the view. But you can u...

Discrete logarithms with auxiliary input

Auxiliary Input helps
The discrete logarithm problem with auxiliary input is defined as the problem to compute the integer $e$ given the input $(g,g^e = r,\mathcal{G})$, whereof $\mathcal{G}$ is an abelian group and $g$ is of prime order $p$ if one knows the additional input $$\left(g^{e^2},g^{e^3},...,g^{e^d}\right) \in \mathcal{G}^d$$ In [1] Jung Hee Cheon presents an algorithm which solves the problem in $\mathcal{O}(\sqrt{p/d} + \sqrt{d})$ using $$\mathcal{O}\left(\max\left(\sqrt{(p-1)/d},\sqrt{d}\right)\right)$$ space if $d | (p-1)$. The algorithm works even if the input is reduced to $(g,g^e=r,\mathcal{G},g^{e^d},d)$ only.

If $p|(p+1)$ he shows how to solve the problem given the full input in $\mathcal{O}\left(\sqrt{p/d} + d\right)$ using the same amount of space as in the case $p|(p-1)$.



In the second paper with Taechan Kim [2] they present an algorithm with a complexity that is based on a polynomial $f \in \mathbb{F}_p[x]$ of degree $d$. They can solve the problem in this case in $\mathcal{\tilde{O}}\left(\sqrt{p/\tau_f}+d\right)$ whereof $\tau_f$ is the number of irreducible factors of the polynomial $f(x)-f(y)$.

The complexity shows that there is a tradeoff. If $d$ is small, the term $\sqrt{p/d}$ dominates and if $d$ gets large the term $\sqrt{d}$ increases the complexity. The reason for this is the following: They linearize the exponent in question, $e$, via $$(\text{Eq.} 1)\;\;\;e = \zeta^{k_0 + \frac{p-1}{d}k_1} $$, whereof $\zeta$ is a generator in $\mathbb{F}^*_p$ (note $p$ is the order of the group). So $k_1 < d$ and $k_0 < \frac{p-1}{d}$. By raising Eq. 1 to the $d$-th power we get $$ e^d = \zeta^{dk_0} $$ so $k_1$ vanishes and we get $e^d = \left(\zeta^d\right)^{k_0}$. Now again, they linearize $k_0$ via $k_0 = u + mv$, whereof $m = \sqrt{(p-1)/d}$. Hence $u,v < \sqrt{(p-1)/d}$, which defines the search space and which explains the first part of the complexity stated above. The term $\sqrt{d}$ follows in a similar way for $k_1$.

# Practical Instances #

In what case can such an auxiliary input occur? Is it a realistic assumption? For the next paragraph we assume that $g$ and the group $\mathcal{G}$ are public information. Assume you have an oracle $\mathcal{O}_{\text{sqr}}$ which is defined as
\begin{equation}
r\;\text{random},\;\;g^r  \stackrel{\text{input}}{\rightarrow} \mathcal{O}_{\text{sqr}} \stackrel{\text{output}}{\rightarrow} g^{r^2}
\end{equation} i.e., it squares the existing exponent regarding the generator $g$. Access to $\mathcal{O}_{\text{sqr}}$ is enough to break the Diffie-Hellmann assumption. Given the two public key $g^x$ and $g^y$, to get $g^{xy}$, just query $\mathcal{O}_{\text{sqr}}$ with $g^x$, $g^y$ and $g^{x+y}$, then compute $$ \left( \frac{g^{(x+y)^2}}{g^{x^2}g^{y^2}}\right)^{1/2} = g^{xy} $$

But the oracle in this case is different. Lets call it $\mathcal{O}_{\text{exp}}$:
\begin{equation}
r\;\text{random},\;\;g^r  \stackrel{\text{input}}{\rightarrow} \mathcal{O}_{\text{exp}} \stackrel{\text{output}}{\rightarrow} g^{er},\;e\;\text{fixed and secret}
\end{equation}Is such an oracle $\mathcal{O}_{\text{exp}}$ realistic? Yes, kind of. Jung Hee Cheon describes several cases where such an additional input is available.
It occurs in the paper [3] by Mitsunari, Sakai, and Kasahara for a traitor tracing scheme. Their security depends on the inability to compute $g^{1/x}$ if only $(g,g^x,g^{x^2},...,g^{x^d})$ is known. However, if you can compute $x$ and if you are able to compute roots in the given group efficiently, you can also solve this kind of problem if you can solve dlp with auxiliary input.

Textbook ElGamal Encryption:
  1. Public Information: Abelian group $\mathcal{G}$ of prime order $p$ with generator $g$
  2. Secret Key: $x \in \mathbb{Z}_p$.
  3. Public Key: $A = g^x \in \mathcal{G}$.
  4. Encrypt(m = message):
    1. $r \stackrel{\$}{\leftarrow} \mathbb{Z}_p$
    2. ciphertext = $(R,c) = (g^r, A^rm) \in \mathcal{G}^2$
  5. Decrypt(ciphertext):
    1. m = $R^{-x}c \in \mathcal{G}$
Another scenario where auxiliary input can be generated is whenever we have access to an ElGamal decryption oracle.

From the public information of the ElGamal scheme an attacker already has the auxiliary input $(g,A=g^x)$. To get more auxiliary input, he can execute the following queries:
  1. $(r_1,r_2) \stackrel{\$}{\leftarrow} \mathbb{Z}^2_p$
  2. ciphertext := $(A^{r_1},A^{r_2}) \in \mathcal{G}^2$
  3. (Query) Decrypt(ciphertext):
    1.  $A^{-xr_1}A^{r_2} = g^{-x^2r_1}g^{xr_2} = t$
  4.  $\left(tA^{-r_2}\right)^{-1/r_1} = g^{x^2} \in \mathcal{G}$
So after one round, he gets the auxiliary input $(g,A=g^x,A_2=g^{x^2})$. For the further auxiliary input he simply replaces $A$ by $A_2$:
  1. $(r_1,r_2) \stackrel{\$}{\leftarrow} \mathbb{Z}^2_p$
  2. ciphertext := $(A_2^{r_1},A_2^{r_2}) \in \mathcal{G}^2$
  3. (Query) Decrypt(ciphertext):
    1.  $A_2^{-xr_1}A_2^{r_2} = g^{-x^3r_1}g^{x^2r_2} = t_2$
  4.  $\left(t_2A_2^{-r_2}\right)^{-1/r_1} = g^{x^3} \in \mathcal{G}$
Repeating this four steps $d$ times yields the auxiliary input $$g^{x^2},g^{x^3},...,g^{x^d}$$


[1] Jung Hee Cheon: Discrete Logarithm Problems with Auxiliary Inputs. J. Cryptology 23(3): 457-476 (2010)
[2] Taechan Kim and Jung Hee Cheon, A new approach to the discrete logarithm problem with auxiliary inputs, Cryptology ePrint Archive: Report 2012/609
[3] S. Mitsunari, R. Sakai, and M. Kasahara, A New Traitor Tracing, IEICE Trans. Fundamentals, Vol. E85-A, no. 2, pp. 481-484, 2002.
 



Comments

Popular posts from this blog

Kryptos - The Cipher (Part 4) - Correctly positioned decryption of the word BERLIN

EASTNORTHEAST - This is not exactly the hint Jim Sanborn (JS) gave for K4 on the 29th of January this year. He only gave NORTHEAST - which refers to the positions 26-34 of K4's plaintext.  Beside BERLIN and CLOCK it is the third revealed plaintext word of K4. However, also this hint does not seem to help much.  However, it just so happened, that a member in the yahoo kryptos group had a conversation with Jim Sanborn due to a submitted solution. Sandborn's answer to the question contained again the last clue which surprisingly was EASTNORTHEAST at position 22-34. Jim Sanborns compass rose at CIA There is disagreement if Jim revealed this on purpose or he did it accidentially, but the new extended clue seem to be serious and valid.Interestingly, EASTNORTHEAST is exactly the direction which is illustrated on the compass rose on one of the stones around kryptos, also created by Jim Sanborn. Actually, i dont really kn...

Kryptos - The Cipher (Part 1) - Introduction

Introduction. Since I think that KRYPTOS does not need any introduction, I will only give you a brief description of one of the most famous and only partially solved ciphers known today: KRYPTOS - Von Jim Sanborn - Jim Sanborn, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=8253447 KRYPTOS was constructed in Nov. 1990 on the ground of the CIA Headquarter in Langley, Virginia by Jim Sanborn It contains 4 ciphers (K1,K2,K3,K4) on its left side and some kind of Vigenère-Table on its right side K1, K2 and K3 were solved by James Gillogly in 1999. Afterwards, the CIA and later the NSA claimed that they had a solution to the first three ciphers at an earlier point in time Ed Scheidt, a cryptoanalyst and former director of the CIA, gave Sanborn the input of possible cryptographic techniques to use K1 is a variant of the Vigenère-Cipher (Quagmire 3) with the codewords KRYPTOS and PALIMPSES...

Kryptos - The Cipher (Part 3)

This post is about is more or less a collection of several approaches and facts that has been said as well as some speculations. B-ary integer representation According to [1] during a Question and Answer round, Jim Sanborn was asked again about the hint BERLIN. The question was if N decodes to B, Y decodes to E, etc, etc. and Jim confirmed it does. Emphatically . It is written, that Jim Sanborn rattled through the entire crib: \begin{align}   \texttt{N} &\stackrel{\text{decode}}{\rightarrow} \texttt{B} \\   \texttt{Y} &\stackrel{\text{decode}}{\rightarrow}  \texttt{E} \\   \texttt{P} &\stackrel{\text{decode}}{\rightarrow}  \texttt{R} \\   \texttt{V} &\stackrel{\text{decode}}{\rightarrow}  \texttt{L} \\   \texttt{T} &\stackrel{\text{decode}}{\rightarrow}  \texttt{I} \\   \texttt{T} &\stackrel{\text{decode}}{\rightarrow}  \texttt{N} \end{align} When the same q...