Abstract
In this paper, we study key exchange protocol which is similar to Diffie-Hellman key exchange protocol. This key exchange protocol uses maximal abelian subgroup of automorphism of group. We give an example group is used for key exchange protocol.
Access provided by CONRICYT-eBooks. Download conference paper PDF
Similar content being viewed by others
Keywords
Mathematics Subject Classification: Primary 94A62, Secondary 20F28
1 Introduction
In cryptography, keys exchange is a method to send a key between a sender and a recipient. The problems of the key exchange are how they send the message so that nobody else can understand the message except for the sender and the recipient. The procedure is one of the first public key cryptographic protocols used to build up a secret key between each other over insecure channel. The protocol itself is constrained to exchange of the keys for example: we are making a key together instead of sharing data while the key exchange. We implement algorithm for exchanging information over a public channel so that building up a mutual secret between two gatherings that can use for secret communication. Diffie-Hellman is suitable to use in information communication and less frequently use for information storage or archived over a long time period. In cryptographic protocol has the key exchange is the first issue. For human development, people try to hide the data from other people so that composing structure. This is assumed that is the first and primitive type of encryption, but it is just only half section of cryptography. The other half is the capacity to reproduce the first message from its hidden structure. Cryptography is like a normal message but nobody except for the exact recipient will understand the message. By that time the huge majority of the cryptosystems were private of symmetric key cryptosystems. In this two clients Alice and Bob select a key, which is their private key then use the key in a private key cryptosystem to convey information over people in public channel. We investigate a public key cryptography regarding the Diffie-Hellman key Exchange Protocol, which is the most primitive thought behind a public key cryptography. In the Diffie-Hellman key exchange protocol, two clients unknown to one another can set up a private however arbitrary key for their symmetric key cryptosystem. The Diffie-Hellman key agreement protocol (1976) was the first practical method for setting up a shared secret over an insecure communication channel.
In modern cryptography, we assume that key is a only secret. Therefore if there are many keys, then the opponent hard break cryptosystem. We will generalized Diffie-Hellman key exchange protocol on groups. We choose key which is automorphism group in maximal abelian subgroup of automorphism group.
2 Preliminaries
In this section, we will introduce Diffie-Hellman Key Exchange and group.
2.1 Diffie-Hellman Key Exchange
The simple and original key exchance protocol uses the module p and \(g \in \{1,\dots ,p-1\}\) where p is a prime in [1].
Example 1
Alice and Bob want to exchange key over an insecure channel.
-
1.
Alice and Bob agree to use the module p and \(g \in \{1,\dots ,p-1\}\) where p is a prime.
-
2.
Alice choose a secret \(a \in \{1,\dots ,p-1\}\). Then she sends \(A=g^a\) mod p to Bob.
-
3.
Bob choose a secret \(b \in \{1,\dots ,p-1\}\). Then he sends \(B=g^b\) mod p to Alice.
-
4.
Alice compute \(B^a\) mod p.
-
5.
Bob compute \(A^b\) mod p.
-
6.
Alice and Bob have common secret key \(A^b=B^a\) mod p.
2.2 Groups
Definition 1
For a nonempty G, a function \(\cdot : G \times G \rightarrow G\) is called a binary operation. Image of \((a,b) \in G\) is denoted by ab. G with binary operation is a group if it has properties
-
1.
Associativity, \(\forall a, b,c \in G, ( a \cdot b) \cdot c = a \cdot (b \cdot c)\),
-
2.
Identity \(\exists e \in , \forall a\in G,a \cdot e = a = e \cdot a\),
-
3.
Inverse \(\forall a \in G \exists b \in G,a \cdot b = e = b \cdot a\).
Definition 2
A group G is commutative if \(\forall a,b \in G,ab=ba\). A commutative group is called abelian group.
Definition 3
Let G and H be groups. A homomorphism from G to H is a map \(\phi : G \rightarrow H\) which satisfy
An isomorphism is a homomorphism which is injection and surjection. We write \( G \cong H\). An automorphism is a isomorphism from G to G. The automorphism group of G is denoted by Aut(G).
Theorem 1
[2]. Let G be a finite abelian group. Then G is isomorphic to a product of groups of the form
in which p is a prime number and \(n_1 \le \dots \le n_m\) are positive integers.
Theorem 2
[2]. Let H and K be finite groups with relatively prime orders. Then
Theorem 3
[2]. Let \(H_p = \mathbb {Z}_{p^{n_1}} \times \dots \times \mathbb {Z}_{p^{n_m}}\) be a group which p is a prime number and \(n_1 \le \dots \le n_m\) are positive integers. Setting \(d_k=\max \{ \ell : n_\ell =n_k \}\) and \(c_k = \min \{ \ell : n_\ell =n_k \}\). Then
Lemma 1
A abelian group \(G = H_{p_1} \times \dots \times H_{p_k}\) which \(p_1< \dots < p_k\) are prime numbers, \(H_p = \mathbb {Z}_{p^{n_1}} \times \dots \times \mathbb {Z}_{p^{n_m}}\) and \(n_1 \le \dots \le n_m\) are positive integers has
Proof
It’s obvious by Theorems 2 and 3.
Theorem 4
[4]. Let n be a positive integer such that \(n\ge 3\) and let \(k=2n^{n-1}\). Let \(G = {<}x,y,z,u{>}\) with defined by
-
1.
\(x^{2n}=y^2=z^2=u^2=[x,z]=[x,u]=[z,u]=[y,z]=1\),
-
2.
\(yxy=x^{k+1}\),
-
3.
\(yuy=zu\).
The Aut(G) is abelian group. It is isomorphic to \(\mathbb {Z}_{2^6} \times \mathbb {Z}_{2^{n-2}}\). The order of G is \(2^{n+3}\).
3 Key Exchange Protocol
Alice and Bob want to exchange key over an insecure channel that is similar in [3].
3.1 Key Exchange Protocol I
-
1.
Alice and Bob choose group G and an element \(g \in G\) in public information. Note that G and g are public information.
-
2.
Alice and Bob choose automorphism \(\phi _A\) and \(\phi _B\) from maximal abelian subgroup S of Aut(G), respectively. Note that \(\phi _A\) and \(\phi _B\) are private information.
-
3.
Alice and Bob compute \(\phi _A(g)\) and \(\phi _B(g)\) respectively and exchange them. Note that \(\phi _A(g)\) and \(\phi _B(g)\) are public information.
-
4.
Both of them compute \(\phi _A(\phi _B(g))=\phi _B(\phi _A(g))\) from their private information, which is their common secret key.
In Example 1 is special case when \(\phi _A(g)=g^a\), \(\phi _B(g)=g^b\) and \(\phi _A(\phi _B(g))=g^{ab}\).
Remark
The opponent hard compute \(\phi _A(\phi _B(g))\) from \(G,g,\phi _A(g),\phi _B(g)\).
Example 2
Alice and Bob want to exchange key over an insecure channel.
-
1.
Alice and Bob agree to use group \(G=\mathbb {Z}_{p^{n}} \times \mathbb {Z}_{q^{m}}\) where p, q are prime and \(g=(g_1,g_2) \in G\).
-
2.
Alice choose \(a = (a_1,a_2)\) where \(gcd(a_1,n)=gcd(a_2,m)=1\). Her automorphism is \(\phi _{A}(g^{\prime })=(g_{1}^{{\prime }^{a_{1}}},g_{2}^{{\prime }^{a_{2}}})\). Bob choose \(b = (b_1,b_2)\) where \(gcd(b_1,n)=gcd(b_2,m)=1\). His automorphism is \(\phi _{B}(g^{\prime })=(g_{1}^{{\prime }^{b_{1}}},g_{2}^{{\prime }^{b_{2}}})\).
-
3.
Alice and Bob compute \(\phi _A(g)\) and \(\phi _B(g)\) respectively and exchange them.
-
4.
Both of them compute \(\phi _A(\phi _B(g))=\phi _B(\phi _A(g))\) from their private information, which is their common secret key.
3.2 Key Exchange Protocol II
-
1.
Alice and Bob choose group G in public information.
-
2.
Alice chooses automorphism \(\phi _A\) from maximal abelian subgroup S of Aut(G) and she choose an element \(g \in G\). Then she sends \(\phi _A(g)\) to Bob. Note that g and \(\phi _A\) are private information but \(\phi _A(g)\) is public information.
-
3.
Bob chooses automorphism \(\phi _B\) from maximal abelian subgroup S of Aut(G). Then he send \(\phi _B(\phi _A(g))\) to Alice. Note that \(\phi _B\) is private information but \(\phi _B(\phi _A(g))\) is public information.
-
4.
Alice compute \(\phi _A^{-1}(\phi _B(\phi _A(g)))= \phi _B(g)\). Next Alice choose automorphism \(\phi _H\) from maximal abelian subgroup S of Aut(G) and compute \(\phi _H(g)\). Then she sends \(\phi _H(\phi _B(g))\) to Bob. Note that \(\phi _H\) is private information but \(\phi _H(\phi _B(g))\) is public information.
-
5.
Bob compute \(\phi _B^{-1}(\phi _H(\phi _B(g)))= \phi _H(g)\), which is their common secret key.
Remark
The opponent hard compute \(\phi _A(\phi _B(g))\) from \(G,\phi _A(g),\phi _B(\phi _A(g)),\phi _H(\phi _B(g))\).
Example 3
Alice and Bob want to exchange key over an insecure channel.
-
1.
Alice and Bob agree to use group \(G=\mathbb {Z}_{p^{n}} \times \mathbb {Z}_{q^{m}}\) where p, q are prime.
-
2.
Alice chooses \(a = (a_1,a_2)\) where \(gcd(a_1,n)=gcd(a_2,m)=1\). Her automorphism is \(\phi _A(g^\prime )=(g_1^{\prime {a_1}},g_2^{\prime {a_2}})\). She choose an element \(g \in G\). Then she sends \(\phi _A(g)\) to Bob.
-
3.
Bob chooses \(b = (b_1,b_2)\) where \(gcd(b_1,n)=gcd(b_2,m)=1\). His automorphism is \(\phi _B(g^\prime )=(g_1^{\prime {b_1}},g_2^{\prime {b_2}})\). Then he send \(\phi _B(\phi _A(g))\) to Alice.
-
4.
Alice compute \(\phi _A^{-1}(\phi _B(\phi _A(g)))= \phi _B(g)\). Next Alice choose \(c = (c_1,c_2)\) where \(gcd(c_1,n)=gcd(c_2,m)=1\). Her automorphism is \(\phi _H(g^\prime )=(g_1^{\prime {c_1}},g_2^{\prime {c_2}})\). Then she sends \(\phi _H(\phi _B(g))\) to Bob.
-
5.
Bob compute \(\phi _B^{-1}(\phi _H(\phi _B(g)))= \phi _H(g)\), which is their common secret key.
References
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Hillar, C.J., Rhea, D.L.: Automorphism of finite abelian groups. Am. Math. Mon. 114, 917–923 (2007)
Mahalanobis, A.: The Diffie-Hellman Key Exchange protocal and non-abelian groups. Israel J. Math. 165, 161–187 (2008)
Struik, R.R.: Some non-abelian \(2\)-groups with abelian automorphism groups. Arch. Math. 39, 299–302 (1982)
Acknowledgements
This project was supported by the Theoretical and Computational Science (TaCS) Center under Computational and Applied Science for Smart Innovation Cluster (CLASSIC), Faculty of Science, KMUTT. The third author would like to thanks the Petchra Pra Jom Klao Ph.D. Research Scholarship for financial support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Jirakitpuwapat, W., Kumam, P. (2018). The Generalized Diffie-Hellman Key Exchange Protocol on Groups. In: Anh, L., Dong, L., Kreinovich, V., Thach, N. (eds) Econometrics for Financial Applications. ECONVN 2018. Studies in Computational Intelligence, vol 760. Springer, Cham. https://doi.org/10.1007/978-3-319-73150-6_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-73150-6_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-73149-0
Online ISBN: 978-3-319-73150-6
eBook Packages: EngineeringEngineering (R0)