FEATURES OF THE IMPLEMENTATION OF THE CRYPTANALYSIS SYSTEM OF HOMOMORPHIC CIPHERS BASED ON THE PROBLEM OF FACTORIZATION OF NUMBERS

  • L.К. Babenko Southern Federal University
  • V.S. Starodubcev Southern Federal University
Keywords: Information security, confidential information, homomorphic encryption, Domingo-Ferrer cryptosystem, cryptanalysis, architecture of the cryptanalysis system

Abstract

This article discusses homomorphic cryptosystems based on the problem of factorization of numbers.
In comparison with Gentry-type cryptosystems, their implementation is less laborious, but it requires
careful verification of durability. The Domingo-Ferrer symmetric cryptosystem is considered as an example
of a homomorphic cryptosystem based on the number factorization problem. For this cryptosystem, the
processes of key generation, encryption, decryption, and performing homomorphic operations are presented.
A description of an attack with a known plaintext on the Domingo-Ferrer cryptosystem is given, as well as a demonstration example of such an attack with a small value of the degree of the polynomials of
the ciphertext representation. For the system architecture under development, the basic requirements and
a general scheme are presented with a brief description of the area of responsibility of individual modules
and their interrelationships. The aim of the study is to identify approaches, techniques and tactics common
to specific cryptanalysis methods of homomorphic cryptosystems based on the problem of factorization of
numbers, and to create a system architecture that would simplify cryptanalysis by providing the cryptanalyst
with a convenient environment and tools for implementing his own cryptanalysis methods. The main
result of this work is the architecture of the cryptanalysis system, which allows for a comprehensive analysis
of vulnerabilities for various attacks and to assess the level of cryptographic strength of the cipher in
question, based on the problem of factorization of numbers, as well as the justification for the use of such
an architecture for the analysis of homomorphic ciphers using the example of the Domingo-Ferrer cryptosystem.
The implementation of a cryptanalysis system based on the proposed architecture will help researchers
and cryptography specialists to study in more detail possible weaknesses in homomorphic ciphers
based on the problem of factorization of numbers and develop appropriate measures to strengthen
their durability. Thus, the ongoing research is important for the development of cryptographic systems
based on the problem of factorization of numbers and provides new tools for cryptanalysts in the field of
analysis of homomorphic cryptosystems. The results obtained can be used to increase the strength of existing
ciphers and develop new cryptographic methods.

References

1. Korotkova D.A. Polnost'yu gomomorfnoe shifrovanie [Fully homomorphic encryption], Alleya nauki
[Science Alley], 2018, Vol. 5, No. 5, pp. 1144-1146.
2. Micciancio D. A first glimpse of cryptography's Holy Grail, Communications of the ACM, 2010,
Vol. 53, No. 3, pp. 96-96.
3. Babenko L.K., Burtyka F.B., Makarevich O.B., Trepacheva A.V. Polnost'yu gomomorfnoe shifrovanie
(obzor) [Fully homomorphic encryption (review), Voprosy zashchity informatsii [Information security
issues], 2015, No. 3, pp. 3-26.
4. Potey M.M., Dhote C.A., Sharma D.H. Homomorphic Encryption for Security of Cloud Data,
Procedia Computer Science, 2016, Vol. 100, No. 79, pp. 175-181.
5. Petrenko A.S. O realizatsii chastichno gomomorfnoy kriptosistemy RSA [On the implementation of
the partially homomorphic RSA cryptosystem], The 2019 Symposium on Cybersecurity of the Digital
Economy-CDE'19, 2019, pp. 266-268.
6. Parmar P.V. et al. Survey of various homomorphic encryption algorithms and schemes, International
Journal of Computer Applications, 2014, Vol. 91, No. 8.
7. Brakerski Z., Gentry C., Vaikuntanathan V. (Leveled) fully homomorphic encryption without bootstrapping,
ACM Transactions on Computation Theory (TOCT), 2014, Vol. 6, No. 3, pp. 1-36.
8. Fan J., Vercauteren F. Somewhat practical fully homomorphic encryption // Cryptology ePrint Archive.
– 2012.
9. Gentry C., Halevi S., Smart N.P. Better bootstrapping in fully homomorphic encryption, International
Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 1-16.
10. Zvika Brakerski. Fully homomorphic encryption without modulus switching from classical gapsvp,
Annual Cryptology Conference. Springer, 2012, pp. 868-886.
11. Trepacheva A.V. Uluchshennaya ataka po izvestnym otkrytym tekstam na gomomorfnuyu kriptosistemu
Domingo-Ferrera [Improved Known Plaintext Attack on the Domingo-Ferrer Homomorphic Cryptosystem],
Tr. Instituta sistemnogo programmirovaniya RAN [Proceedings of the Institute of System Programming
of the Russian Academy of Sciences], 2014, Vol. 26, No. 5, pp. 83-98.
12. Trepacheva A.V. Kriptoanaliz simmetrichnykh polnost'yu gomomorfnykh lineynykh kriptosistem na
osnove zadachi faktorizatsii chisel [Cryptanalysis of symmetric fully homomorphic linear cryptosystems
based on the problem of factorization of numbers], Izvestiya YuFU. Tekhnicheskie nauki
[Izvestiya SFedU. Engineering Sciences], 2015, No. 5 (166), pp. 89-102.
13. Alabdulatif A., Kaosar M. Privacy preserving cloud computation using Domingo-Ferrer scheme, Journal
of King Saud University-Computer and Information Sciences, 2016, Vol. 28, No. 1, pp. 27-36.
14. Cheon J.H., Kim W.H., Nam H.S. Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic
privacy homomorphism scheme, Information Processing Letters, 2006, Vol. 97, No. 3, pp. 118-123.
15. Cheon J.H., Nam H.S. A cryptanalysis of the original domingo-ferrer's algebraic privacy
homomophism, Cryptology EPrint Archive, 2003.
16. Kalelkar M., Churi P., Kalelkar D. Implementation of model-view-controller architecture pattern for business
intelligence architecture, International Journal of Computer Applications, 2014, Vol. 102, No. 12.
17. Hejlsberg A. et al. The C# programming language. Pearson Education, 2008.
18. Bahar A.Y. et al. Survey on Features and Comparisons of Programming Languages (PYTHON, JAVA,
AND C#), 2022 ASU International Conference in Emerging Technologies for Sustainability and Intelligent
Systems (ICETSIS). IEEE, 2022, pp. 154-163.
19. Nagibin V.A. Proektirovanie i realizatsiya sistemy podklyuchaemykh moduley v prilozheniyakh na
yazyke C [Design and implementation of a system of plug-in modules in applications in the C language],
Put' v nauku: prikladnaya matematika, informatika i informatsionnye tekhnologii [Path to science:
applied mathematics, computer science and information technology], 2023, pp. 27-29.
20. Martynov A. Back/Forward i Undo/Redo v .NET-prilozheniyakh [Back/Forward and Undo/Redo in
.NET applications], RSDN Magazine [RSDN Magazine], 2003, No. 2.
Published
2024-08-12
Section
SECTION II. INFORMATION PROCESSING ALGORITHMS