8

I am researching post quantum cryptography and I've stumbled upon this article which presents a PKC with an np-complete (SAT) trapdoor.

I was wondering if someone could help me understand the way the encryption works. From what I understand the cipher text is a formula which consist of a bit (the message) which is then xored with variables taken from the public key. Doesn't it mean that the bit is actually in "plain sight" inside the cipher text ?

Surely I am missing something.

Yuon
  • 163
  • 9

3 Answers3

10

There are known impossibility results regarding basis public-key cryptography on NP-complete problems. In this paper by Goldreich and Goldwasser they show that under common types of reductions, it is not possible to base public-key cryptography on NP-hardness.

Yehuda Lindell
  • 28,270
  • 1
  • 69
  • 86
2

I do not have enough high reputation to comment so I am writing here. I have also looked at the paper so I would like to share my thoughts. I think that in order to understand whether the bit is in the "plain sight" one has to ask the question: Is it possible to recover the bit $y$ from the cipher

$$g=y\oplus \bigoplus _{i=1}^{\alpha}\bigoplus_{a=1}^{\beta}{\bar{c}}_{J(i,a)}\land R_{i,a}$$

Well, it seems difficult. In the context of the paper recovering the bit $y$ from the cipher should be at least as hard as solving SAT.

Kristina
  • 31
  • 2
1

I think, the original question has been well answered by Carl Löndahl in the comments. Each of the terms you add does not only consist of "random variables" but may well contain a constant (1).

In fact, section 3.1.2 Constant Term Probability Attack in the paper exactly addresses your question, by proposing the attack of just looking at the constant term (0 or 1).

When considering the encryption scheme from the article, please also have a look at this article which references a similar SAT based scheme which has a known vulnerability. It is currently unclear whether the same vulnerability also exist in the scheme from the arxive.

Unfortunately, I may not comment:

@Kristina dedndreaj: Deriving the private from the public key is (exactly) the SAT Problem, hence NP hard, but, whether deriving the clear text from the cipher and public key is hard in any sense is an open question. Showing that this is NP hard is very difficult and there are no-go theorems around (see Yehuda Lindell's Answer).

EDIT (thanks to clarification by Occams_Trimmer in comments):

There are a few schemes which are currently believed to be "post-quantum". This may or may not mean that some NP-Hard Problem is utilized for the cryptosystem in some way. See e.g. https://en.wikipedia.org/wiki/Post-quantum_cryptography . A better Referenz is Bernstein, Buchmann, and Dahmen: Post-Quantum Cryptography which e.g. has this quote:

A multivariate public key cryptosystem (MPKCs for short) have a set of (usually) quadratic polynomials over a finite field as its public map. Its main security assumption is backed by the NP-hardness of the problem to solve nonlinear equations over a finite field. This family is considered as one of the major families of PKCs that could resist potentially even the powerful quantum computers of the future.

in the abstract of Multivariate Public Key Cryptography by Ding and Yang.

Echsecutor
  • 113
  • 4