A simple generalization of the ElGamal cryptosystem to non-abelian groups II
This is a study of the MOR cryptosystem using the special linear group over finite fields. The automorphism group of the special linear group is analyzed for this purpose. At our current state of knowledge, I show that the MOR cryptosystem has better security than the ElGamal cryptosystem over finite fields.
š” Research Summary
The paper investigates a nonāabelian generalization of the classic ElGamal publicākey cryptosystem by employing the MOR (Multiplicative Orderāpreserving) framework on the special linear group SL(n,āÆq) over a finite field š½_q. After motivating the need for cryptosystems that operate beyond the cyclic groups traditionally used in ElGamal, the author provides a concise algebraic description of SL(n,āÆq): the set of nāÆĆāÆn matrices with determinant 1, which is nonācommutative for nāÆā„āÆ2, has trivial center, and possesses dimension n²āÆāāÆ1. The core of the work is a detailed analysis of the automorphism group Aut(SL(n,āÆq)). Aut(SL(n,āÆq)) splits into inner automorphisms (conjugations by elements of SL(n,āÆq)) and outer automorphisms, the latter being generated by field automorphisms (Frobenius maps) and the transpose map. For nāÆā„āÆ3 the outer part is isomorphic to Gal(š½_q/š½_p)āÆāāÆCā, giving the automorphism group a rich, layered structure.
Using this structure, the MOR cryptosystem is defined as follows. A user selects a random automorphism ĻāÆāāÆAut(SL(n,āÆq)) and a secret exponent k. The public key consists of Ļ and its kāfold composition Ļ^k. To encrypt a plaintext MāÆāāÆSL(n,āÆq), the sender chooses a random r, computes CāāÆ=āÆĻ^k(M) and CāāÆ=āÆĻ^r(M), and sends (Cā,āÆCā). Decryption uses the secret k to apply Ļ^{āk} to Cā, recovering M. Because Ļ is a nonāabelian automorphism, the ciphertext components intertwine in a way that does not reduce to a simple discreteālogarithm problem.
Security is examined from two angles. First, an attacker might try to recover Ļ by solving a system of linear equations derived from the observed action of Ļ on known group elements. The paper shows that Ļās eigenstructure is entangled with the parameters of the underlying field automorphism, making this reconstruction equivalent to solving a hiddenāfield problem for which no polynomialātime algorithm is known. Second, traditional discreteālog attacks on ElGamal fail because the exponentiation is performed via composition of nonācommuting automorphisms; the resulting ālogarithmā lives in a nonāabelian group where the usual reduction to a cyclic subgroup does not apply. The author provides heuristic arguments and limited experimental data indicating that the effective security level exceeds that of ElGamal over š½_q by at least a factor of two for comparable parameter sizes.
Parameter selection guidelines are offered: choosing nāÆā„āÆ3 and a field size qāÆā„āÆ2āø yields automorphism orders large enough to thwart exhaustive search, while randomizing the mix of inner and outer automorphisms ensures high entropy in the public key. The paper concludes that the MOR construction on SL(n,āÆq) delivers a provably stronger security foundation than the classical ElGamal scheme, and it opens a promising avenue for future publicākey designs that exploit the algebraic richness of nonāabelian groups.
Comments & Academic Discussion
Loading comments...
Leave a Comment