FEATURES OF THE IMPLEMENTATION OF THE CRYPTANALYSIS SYSTEM OF HOMOMORPHIC CIPHERS BASED ON THE PROBLEM OF FACTORIZATION OF NUMBERS
Abstract
This article discusses homomorphic cryptosystems based on the problem of factorization of numbers. In comparison with Gentry-type cryptosystems, their implementation is less laborious, but it requires careful verification of durability. The Domingo-Ferrer symmetric cryptosystem is considered as an example of a homomorphic cryptosystem based on the number factorization problem. For this cryptosystem, the processes of key generation, encryption, decryption, and performing homomorphic operations are presented. A description of an attack with a known plaintext on the Domingo-Ferrer cryptosystem is given, as well as a demonstration example of such an attack with a small value of the degree of the polynomials of the ciphertext representation. For the system architecture under development, the basic requirements and a general scheme are presented with a brief description of the area of responsibility of individual modules and their interrelationships. The aim of the study is to identify approaches, techniques and tactics common to specific cryptanalysis methods of homomorphic cryptosystems based on the problem of factorization of numbers, and to create a system architecture that would simplify cryptanalysis by providing the cryptanalyst with a convenient environment and tools for implementing his own cryptanalysis methods. The main result of this work is the architecture of the cryptanalysis system, which allows for a comprehensive analysis of vulnerabilities for various attacks and to assess the level of cryptographic strength of the cipher in question, based on the problem of factorization of numbers, as well as the justification for the use of such an architecture for the analysis of homomorphic ciphers using the example of the Domingo-Ferrer cryptosystem. The implementation of a cryptanalysis system based on the proposed architecture will help researchers and cryptography specialists to study in more detail possible weaknesses in homomorphic ciphers based on the problem of factorization of numbers and develop appropriate measures to strengthen their durability. Thus, the ongoing research is important for the development of cryptographic systems based on the problem of factorization of numbers and provides new tools for cryptanalysts in the field of analysis of homomorphic cryptosystems. The results obtained can be used to increase the strength of existing ciphers and develop new cryptographic methods.
References
[Science Alley], 2018, Vol. 5, No. 5, pp. 1144-1146.
2. Micciancio D. A first glimpse of cryptography's Holy Grail, Communications of the ACM, 2010,
Vol. 53, No. 3, pp. 96-96.
3. Babenko L.K., Burtyka F.B., Makarevich O.B., Trepacheva A.V. Polnost'yu gomomorfnoe shifrovanie
(obzor) [Fully homomorphic encryption (review), Voprosy zashchity informatsii [Information security
issues], 2015, No. 3, pp. 3-26.
4. Potey M.M., Dhote C.A., Sharma D.H. Homomorphic Encryption for Security of Cloud Data,
Procedia Computer Science, 2016, Vol. 100, No. 79, pp. 175-181.
5. Petrenko A.S. O realizatsii chastichno gomomorfnoy kriptosistemy RSA [On the implementation of
the partially homomorphic RSA cryptosystem], The 2019 Symposium on Cybersecurity of the Digital
Economy-CDE'19, 2019, pp. 266-268.
6. Parmar P.V. et al. Survey of various homomorphic encryption algorithms and schemes, International
Journal of Computer Applications, 2014, Vol. 91, No. 8.
7. Brakerski Z., Gentry C., Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping,
ACM Transactions on Computation Theory (TOCT), 2014, Vol. 6, No. 3, pp. 1-36.
8. Fan J., Vercauteren F. Somewhat practical fully homomorphic encryption // Cryptology ePrint Archive.
– 2012.
9. Gentry C., Halevi S., Smart N.P. Better bootstrapping in fully homomorphic encryption, International
Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 1-16.
10. Zvika Brakerski. Fully homomorphic encryption without modulus switching from classical gapsvp,
Annual Cryptology Conference. Springer, 2012, pp. 868-886.
11. Trepacheva A.V. Uluchshennaya ataka po izvestnym otkrytym tekstam na gomomorfnuyu kriptosistemu
Domingo-Ferrera [Improved Known Plaintext Attack on the Domingo-Ferrer Homomorphic Cryptosystem],
Tr. Instituta sistemnogo programmirovaniya RAN [Proceedings of the Institute of System Programming
of the Russian Academy of Sciences], 2014, Vol. 26, No. 5, pp. 83-98.
12. Trepacheva A.V. Kriptoanaliz simmetrichnykh polnost'yu gomomorfnykh lineynykh kriptosistem na
osnove zadachi faktorizatsii chisel [Cryptanalysis of symmetric fully homomorphic linear cryptosystems
based on the problem of factorization of numbers], Izvestiya YuFU. Tekhnicheskie nauki
[Izvestiya SFedU. Engineering Sciences], 2015, No. 5 (166), pp. 89-102.
13. Alabdulatif A., Kaosar M. Privacy preserving cloud computation using Domingo-Ferrer scheme, Journal
of King Saud University-Computer and Information Sciences, 2016, Vol. 28, No. 1, pp. 27-36.
14. Cheon J.H., Kim W.H., Nam H.S. Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic
privacy homomorphism scheme, Information Processing Letters, 2006, Vol. 97, No. 3, pp. 118-123.
15. Cheon J.H., Nam H.S. A cryptanalysis of the original domingo-ferrer's algebraic privacy
homomophism, Cryptology EPrint Archive, 2003.
16. Kalelkar M., Churi P., Kalelkar D. Implementation of model-view-controller architecture pattern for business
intelligence architecture, International Journal of Computer Applications, 2014, Vol. 102, No. 12.
17. Hejlsberg A. et al. The C# programming language. Pearson Education, 2008.
18. Bahar A.Y. et al. Survey on Features and Comparisons of Programming Languages (PYTHON, JAVA,
AND C#), 2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent
Systems (ICETSIS). IEEE, 2022, pp. 154-163.
19. Nagibin V.A. Proektirovanie i realizatsiya sistemy podklyuchaemykh moduley v prilozheniyakh na
yazyke C [Design and implementation of a system of plug-in modules in applications in the C language],
Put' v nauku: prikladnaya matematika, informatika i informatsionnye tekhnologii [Path to science:
applied mathematics, computer science and information technology], 2023, pp. 27-29.
20. Martynov A. Back/Forward i Undo/Redo v .NET-prilozheniyakh [Back/Forward and Undo/Redo in
.NET applications], RSDN Magazine [RSDN Magazine], 2003, No. 2.