Skip to main content

Featured Post

Ed Scheidts Mayan Symbols - Can we solve the puzzle?

In this post I want to talk about a thing from the Kryptos universe that are not directly related to the statue. But i think it may be an indirect hint to some Kryptos related methods. The Mayan Symbols in Ed Scheidts driveway I think everyone who knows Kryptos knows Ed Scheidt. The former Chairman of the Cryptographic Center at the CIA and founder of the cryptosystems used around the Kryptos statue. As already shown in Part 4 of my Kryptos series, in the driveway of Ed Scheidts house, there are two symbols: Figure 1 - Garage driveway of Ed Scheidt We denote the left symbol set with $S_1$ and the right one with $S_2$. It took me a while to find his house on Google Maps - Street View. To save you some time, here is the link with a view on the driveway. I you go back in time in Streetview, you can see that the symbols were already there in 2012. But it is impossible to say when they were built. $S_1$ is clearly visible from the street, $S_2$ is hidden in the view. But you can u...

Assumption - Zoo

I know that this list is far from being complete. This site is heavily under construction and i will complete the enumeration from time to time. See also the document from ECrypt, which is a very comprehensive list of assumption.

I will add from time to time a small example for each assumption, with a bitsize such that the toy instance should be solveable for (mostly) everybody with a little coding skills.

1. Integer Factoring


Integer Factoring Assumption

Description: Given an $k$-bit integer $N$, then the task to find $N$'s prime factorization $N = p_1^{e_1}...p_m^{e_m}$ is assumed to be hard.

E.g. used in: Dennis Hofheinz, Eike Kiltz, Victor Shoup: Practical Chosen Ciphertext Secure Encryption from Factoring. J. Cryptology 26(1): 102-118 (2013)



RSA Assumption 

Description: Given a RSA public key $(e,N)$ as well as a ciphertext $c \equiv m^e \pmod{N}$, for some secret message $m$. Then the task to compute $m$ given only $(e,N)$ and $c$ is assumed to be hard.

E.g. used in: Rivest, R.; A. Shamir; L. Adleman (1978). "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems". Communications of the ACM 21 (2): 120–126.



Strong RSA Assumption 

Description:  Given a RSA public key $(e,N)$ as well as a ciphertext $c \equiv m^e \pmod{N}$, for some secret message $m$. Then the task to compute any integer $M$, such that $c \equiv M^{E}\pmod{N}$ for an odd integer $E$ given only $(e,N)$ and $c$ is assumed to be hard. (The RSA Assumption is to force $E = e$).

E.g. used in: Ronald Cramer and Victor Shoup. Signature schemes based on the strong RSA assumption. ACM Transactions on Information and System Security, 3(3):161–185, 2000.


Difference RSA Assumption 

Description:  Given a RSA public key $(e,N)$ and $D \in \mathbb{Z}^*_N$ as well as $m-1$ pairs $(x_i,y_i)$ such that $x_i^e - y_i^e \equiv D\pmod{N}$, then the task to find a new pair $(x_m,y_m)$ such that $y_m^e - x_m^e \equiv D\pmod{N}$ is assumed to be hard.

E.g. used in: M. Naor, On Cryptographic Assumptions and Challenges, Invited paper, Crypto 2003.


Quadratic Residuosity Assumption

Description:  Let $N=pq$ with two odd secret primes $p$ and $q$ and let $\mathbb{QR} = \{a \in \mathbb{Z}^*_N | \binom{a}{p} = \binom{a}{q} = 1\}$ as well as $\mathbb{QNR} = \{a \in \mathbb{Z}^*_N | \binom{a}{p} = \binom{a}{q} = -1\}$, then the task to decide better than random guessing, given only $N$ and $a$, if $a \in \mathbb{QR}$ or $a \in \mathbb{QNR}$ is assumed to be hard.

E.g. used in: S. Goldwasser, S. Micali (1982). "Probabilistic encryption and how to play mental poker keeping secret all partial information". Proc. 14th Symposium on Theory of Computing: 365–377. 


Higher Residuosity Assumption

Description:  Let $N=pq$ with two odd secret primes $p$ and $q$ and let $d > 1$ be an odd integer such that $d|(p-1)$, then given only $N,d$ and an integer $a < N$, the the task to decide better than random guessing if $a$ is a $d$-th residue (i.e. $\exists b < N$ such that $b^d \equiv a\pmod{N}$) is assumed to be hard. (Setting $d = 2$ and picking $a$ only from the subset of integers $< N$ with positive Jacoby symbol is equal to the Quadratic Residuosity Assumption).

E.g. used in: Benaloh, J. ,Dense Probabilistic Encryption, Proceedings of the Workshop on Selected Areas of Cryptography. Kingston, ON. May 1994. pp. 120--128.


Decisional Composite Residuosity Assumption

Description:  Let $N=pq$ with two odd secret primes $p$ and $q$. Then given only an integer $z < N^2$ and $N$ itself, the the task to decide better than random guessing if $z$ is a $N$-th residue modulo $N^2$ (i.e. $\exists b < N^2$ such that $b^N \equiv z\pmod{N^2}$) is assumed to be hard.

E.g. used in: P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Eurocrypt 1999.


Phi-hiding Assumption

Description:  Let $N$ be an integer with unknown factorization. Let $\rho_1$ and $\rho_2$ be two primes in the interval $N^{1/4} > \rho_1, \rho_2 > 3$. The setup is chosen that way, that exactly one of these two primes $\rho_1$ and $\rho_2$ divides $\varphi(N)$. Then the task to decide better than random guessing, given only the triple $N,\rho_1,\rho_2$, which of them divides $\varphi(N)$ is assumed to be hard.

E.g. used in: Cachin, Christian; Micali, Silvio; Stadler, Markus (1999). Computationally Private Information Retrieval with Polylogarithmic Communication. In Stern, Jacques. Lecture Notes in Computer Science (Springer) 1592: 402–414.

 

2. Discrete Logarithm


The Discrete Logarithm Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given $g,\mathbb{G}$ and an group element $r$, the task to compute the integer $x$ such that $g^x = r$ is assumed to be hard.

E.g. used in: Schnorr (1989). "Efficient Identification and Signatures for Smart Cards". Proceedings of CRYPTO '89.


The Computational Diffie-Hellman Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given the group elements $g^x,g^y$ for random integers $x,y$, the task to compute the integer $g^{xy}$ is assumed to be hard. A triple $(g^x,g^y,g^{xy})$ is called a Diffie-Hellman triple.

E.g. used in: Diffie, W. and Hellman, M. E.: New Directions in Cryptography. In: IEEE Transactions on Information Theory. 22, Nr. 6, 1976, S. 644–654.


The Static Diffie-Hellman Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given the group elements $g,g^x$ for a random integer $x$ as well as an $h \in \mathbb{G}$, the task to compute the integer $h^{x}$ is assumed to be hard.

E.g. used in: Daniel R. L. Brown, Robert P. Gallant: The Static Diffie-Hellman Problem. IACR Cryptology ePrint Archive 2004: 306 (2004).


The Decisional Diffie-Hellman Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given the two triples of group elements $T_1 = (g^x,g^y,g^{xy})$ and $T_2 = (g^x,g^y,g^{z})$ for random integers $x,y,z$, the task to decide better than random guessing if $T_1$ or $T_2$ is a Diffie-Hellman triple is assumed to be hard.

E.g. used in: Boneh, Dan (1998). "The Decision Diffie–Hellman Problem". Proceedings of the Third Algorithmic Number Theory Symposium. Lecture Notes in Computer Science 1423


The Strong Decisional Diffie-Hellman Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given $g,\mathbb{G}$ and the two quadruple of group elements $T_1 = (g^x,g^y,g^{xy})$ and $T_2 = (g^x,g^y,g^{z})$ for random integers $x,y,z$ as well as the element $g^{y^{-1}}$, the task to decide better than random guessing if $T_1$ or $T_2$ is a Diffie-Hellman triple is assumed to be hard.

E.g. used in: B. Pfitzmann and A. Sadeghi, Anonymous Fingerprinting with Direct Non-repudiation, Advances in Cryptology - AsiaCrypt 2000.


The Square Diffie-Hellman Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given the element $g^{x}$, then the task to compute $g^{x^2}$ is assumed to be hard.

E.g. used in: Dongyoung Roh,Sang Geun Hahn, The square root Diffie–Hellman problem, Designs, Codes and Cryptography, February 2012, Volume 62, Issue 2, pp 179-187.


The Gap Diffie-Hellman Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given the element $g^{x},g^{y}$, then the task to compute $g^{xy}$ is assumed to be hard, even if one has access to an oracle that solves the Decisional Diffie-Hellman Assumption.

E.g. used in: T. Okamoto and D. Pointcheval, “The gap-problem: a new class of problems for the security of cryptographic schemes”, PKC 2001 , LNCS 1992, Springer-Verlag, pp. 104–118, 2001.


The Linear Assumption

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given the element $g^{a},g^{b},g^{ac},g^{bd}$, then the task to compute $g^{c+d}$ is assumed to be hard.

E.g. used in: [TBA].


The $l$-Hensel Discrete Logarithm Assumption

Description:  Let $g$ be a generator of prime order $r$ that generates the group $\mathbb{G}$ in $\mathbb{Z}^*_p$ for a prime number $p$. Let further $g^r \equiv 1\pmod{p^{l-1}}$ but $g^r \not \equiv 1\pmod{p^l} $. Then given an element $g^x \pmod{p^{l-1}}$ for some random and secret $x < r-1$, computing $g^x\pmod{g^l}$ is assumed to be hard.

E.g. used in: Dario Catalano, Phong Q. Nguyen, Jacques Stern: The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm. ASIACRYPT 2002: 299-310.


The Discrete Logarithm Assumption with Auxiliary Input

Description:  Let $g$ be a generator of prime order that generates the group $\mathbb{G}$. Then given $g,g^x,g^{x^2},...,g^{x^d}$ and $\mathbb{G}$ with $g^x = r$, the task to compute the integer $x$ is assumed to be hard.

E.g. used in: Jung Hee Cheon, Discrete Logarithm Problems with Auxiliary Inputs, Journal of Cryptology, July 2010, Volume 23, Issue 3, pp 457-476

Comments

Popular posts from this blog

Kryptos - The Cipher (Part 4) - Correctly positioned decryption of the word BERLIN

EASTNORTHEAST - This is not exactly the hint Jim Sanborn (JS) gave for K4 on the 29th of January this year. He only gave NORTHEAST - which refers to the positions 26-34 of K4's plaintext.  Beside BERLIN and CLOCK it is the third revealed plaintext word of K4. However, also this hint does not seem to help much.  However, it just so happened, that a member in the yahoo kryptos group had a conversation with Jim Sanborn due to a submitted solution. Sandborn's answer to the question contained again the last clue which surprisingly was EASTNORTHEAST at position 22-34. Jim Sanborns compass rose at CIA There is disagreement if Jim revealed this on purpose or he did it accidentially, but the new extended clue seem to be serious and valid.Interestingly, EASTNORTHEAST is exactly the direction which is illustrated on the compass rose on one of the stones around kryptos, also created by Jim Sanborn. Actually, i dont really kn...

Kryptos - The Cipher (Part 1) - Introduction

Introduction. Since I think that KRYPTOS does not need any introduction, I will only give you a brief description of one of the most famous and only partially solved ciphers known today: KRYPTOS - Von Jim Sanborn - Jim Sanborn, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=8253447 KRYPTOS was constructed in Nov. 1990 on the ground of the CIA Headquarter in Langley, Virginia by Jim Sanborn It contains 4 ciphers (K1,K2,K3,K4) on its left side and some kind of Vigenère-Table on its right side K1, K2 and K3 were solved by James Gillogly in 1999. Afterwards, the CIA and later the NSA claimed that they had a solution to the first three ciphers at an earlier point in time Ed Scheidt, a cryptoanalyst and former director of the CIA, gave Sanborn the input of possible cryptographic techniques to use K1 is a variant of the Vigenère-Cipher (Quagmire 3) with the codewords KRYPTOS and PALIMPSES...

Kryptos - The Cipher (Part 3)

This post is about is more or less a collection of several approaches and facts that has been said as well as some speculations. B-ary integer representation According to [1] during a Question and Answer round, Jim Sanborn was asked again about the hint BERLIN. The question was if N decodes to B, Y decodes to E, etc, etc. and Jim confirmed it does. Emphatically . It is written, that Jim Sanborn rattled through the entire crib: \begin{align}   \texttt{N} &\stackrel{\text{decode}}{\rightarrow} \texttt{B} \\   \texttt{Y} &\stackrel{\text{decode}}{\rightarrow}  \texttt{E} \\   \texttt{P} &\stackrel{\text{decode}}{\rightarrow}  \texttt{R} \\   \texttt{V} &\stackrel{\text{decode}}{\rightarrow}  \texttt{L} \\   \texttt{T} &\stackrel{\text{decode}}{\rightarrow}  \texttt{I} \\   \texttt{T} &\stackrel{\text{decode}}{\rightarrow}  \texttt{N} \end{align} When the same q...