Title page for ETD etd-03262004-082608


Type of Document Dissertation
Author Rai, Tapan S
Author's Email Address tapan@vt.edu
URN etd-03262004-082608
Title Infinite Groebner Bases And Noncommutative Polly Cracker Cryptosystems
Degree PhD
Department Mathematics
Advisory Committee
Advisor Name Title
Green, Edward L. Committee Chair
Brown, Ezra A. Committee Member
Haskell, Peter E. Committee Member
Linnell, Peter A. Committee Member
Rossi, John F. Committee Member
Keywords
  • Computational Algebra
  • Public Key Cryptography
  • Noncommutative Groebner Bases
  • Information Security
  • Polly Cracker
Date of Defense 2004-03-23
Availability unrestricted
Abstract
We develop a public key cryptosystem whose security is based on the intractability of the ideal membership problem for a noncommutative algebra over a finite field. We show that this system, which is the noncommutative analogue of the Polly Cracker cryptosystem, is more secure than the commutative version. This is due to the fact that there are a number of ideals of noncommutative algebras (over finite fields) that have infinite reduced Groebner bases, and can be used to generate a public key. We present classes of such ideals and prove that they do not have a finite Groebner basis under any admissible order. We also examine various techniques to realize finite Groebner bases, in order to determine whether these ideals can be used effectively in the design of a public key cryptosystem.

We then show how some of these classes of ideals, which have infinite reduced Groebner bases, can be used to design a public key cryptosystem. We also study various techniques of encryption. Finally, we study techniques of cryptanalysis that may be used to attack the cryptosystems that we present. We show how poorly constructed public keys can in fact, reveal the private key, and discuss techniques to design public keys that adequately conceal the private key. We also show how linear algebra can be used in ciphertext attacks and present a technique to overcome such attacks. This is different from the commutative version of the Polly Cracker cryptosystem, which is believed to be susceptible to "intelligent" linear algebra attacks.

Files
  Filename       Size       Approximate Download Time (Hours:Minutes:Seconds) 
 
 28.8 Modem   56K Modem   ISDN (64 Kb)   ISDN (128 Kb)   Higher-speed Access 
  rai_etd.pdf 501.95 Kb 00:02:19 00:01:11 00:01:02 00:00:31 00:00:02

Browse All Available ETDs by ( Author | Department )

dla home
etds imagebase journals news ereserve special collections
virgnia tech home contact dla university libraries

If you have questions or technical problems, please Contact DLA.