Complexity of Decision Problems in Polycyclic Groups Delaram Kahrobaei New York City College of Technology City University of New York

Slides:



Advertisements
Similar presentations
Turing Machines January 2003 Part 2:. 2 TM Recap We have seen how an abstract TM can be built to implement any computable algorithm TM has components:
Advertisements

Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Cryptography and Network Security
Chapter 4 Finite Fields. Introduction of increasing importance in cryptography –AES, Elliptic Curve, IDEA, Public Key concern operations on “numbers”
Information and Coding Theory
Probabilistic verification Mario Szegedy, Rutgers www/cs.rutgers.edu/~szegedy/07540 Lecture 3.
I Advanced Algorithms Analysis. What is Algorithm?  A computer algorithm is a detailed step-by-step method for solving a problem by using a computer.
Math 3121 Abstract Algebra I
Subgroup Lattices and their Chromatic Number Voula Collins Missouri State University REU Summer 2008.
Galois Theory and Phil Pollard. To Be Spoken: The purpose of this project is to present a brief introduction to Galois Theory and to illustrate it’s uses.
Group THeory Bingo You must write the slide number on the clue to get credit.
Advanced Information Security 4 Field Arithmetic
On Unsolvability of Group Theoretic Decision Problems Delaram Kahrobaei New York City College of Technology City University of New York
Chapter 4 – Finite Fields Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic Curve, IDEA, Public.
Chapter 11: Limitations of Algorithmic Power
CS10 The Beauty and Joy of Computing Lecture #23 : Limits of Computing Thanks to the success of the Kinect, researchers all over the world believe.
Chapter 11 Limitations of Algorithm Power Copyright © 2007 Pearson Addison-Wesley. All rights reserved.
Manindra Agrawal NUS / IITK
Polynomial Factorization Olga Sergeeva Ferien-Akademie 2004, September 19 – October 1.
1.1 Chapter 1: Introduction What is the course all about? Problems, instances and algorithms Running time v.s. computational complexity General description.
M. Khalily Dermany Islamic Azad University.  finite number of element  important in number theory, algebraic geometry, Galois theory, cryptography,
Topics 4: Algebras. Groups. Representation Lecture 9.
CPSC 3730 Cryptography and Network Security
Polynomial Datapaths Optimization Using Finite Abstract Algebra(I) Presenter: 陳炳元 Graduate Institute of Electronics Engineering Graduate Institute of Electronics.
Chapter Complexity of Algorithms –Time Complexity –Understanding the complexity of Algorithms 1.
Chapter 11 Limitations of Algorithm Power. Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples:
Computational Complexity Polynomial time O(n k ) input size n, k constant Tractable problems solvable in polynomial time(Opposite Intractable) Ex: sorting,
2.3 Functions A function is an assignment of each element of one set to a specific element of some other set. Synonymous terms: function, assignment, map.
1 Ethics of Computing MONT 113G, Spring 2012 Session 13 Limits of Computer Science.
Analysis of Algorithms
PRIMES is in P Manindra Agrawal NUS Singapore / IIT Kanpur.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
Complexity and G ö del Incomplete theorem 電機三 B 劉峰豪.
Instructor: Prof. Pushpak Bhattacharyya 13/08/2004 CS-621/CS-449 Lecture Notes CS621/CS449 Artificial Intelligence Lecture Notes Set 6: 22/09/2004, 24/09/2004,
Session 1 Stream ciphers 1.
Major objective of this course is: Design and analysis of modern algorithms Different variants Accuracy Efficiency Comparing efficiencies Motivation thinking.
1 Lower Bounds Lower bound: an estimate on a minimum amount of work needed to solve a given problem Examples: b number of comparisons needed to find the.
P, NP, and Exponential Problems Should have had all this in CS 252 – Quick review Many problems have an exponential number of possibilities and we can.
By S. Joshi. Content Binary Structures & Group Subgroup Isomorphism Rings Fields.
David Renardy.  Simple Group- A nontrivial group whose only normal subgroups are itself and the trivial subgroup.  Simple groups are thought to be classified.
Cryptography and Network Security Chapter 4. Introduction  will now introduce finite fields  of increasing importance in cryptography AES, Elliptic.
LIMITATIONS OF ALGORITHM POWER
On the Notion of Pseudo-Free Groups Ronald L. Rivest MIT Computer Science and Artificial Intelligence Laboratory TCC 2/21/2004.
11 RSA Variants.  Scheme ◦ Select s.t. p and q = 3 mod 4 ◦ n=pq, public key =n, private key =p,q ◦ y= e k (x)=x (x+b) mod n ◦ x=d k (y)=  y mod n.
CES 592 Theory of Software Systems B. Ravikumar (Ravi) Office: 124 Darwin Hall.
NP-Completeness  For convenience, the theory of NP - Completeness is designed for decision problems (i.e. whose solution is either yes or no).  Abstractly,
Young CS 331 D&A of Algo. NP-Completeness1 NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and.
Chapter 4 With Question/Answer Animations 1. Chapter Summary Divisibility and Modular Arithmetic - Sec 4.1 – Lecture 16 Integer Representations and Algorithms.
Senior Project Board Implementation of the Solution to the Conjugacy Problem in Thompson’s Group F by Nabil Hossain Advisers: James Belk & Robert McGrail.
Page : 1 bfolieq.drw Technical University of Braunschweig IDA: Institute of Computer and Network Engineering  W. Adi 2011 Lecture-5 Mathematical Background:
PRIMES is in P Manindra Agrawal Neeraj Kayal Nitin Saxena Dept of CSE, IIT Kanpur.
Chapter 10 NP-Complete Problems.
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
Analysis and design of algorithm
Chapter 1: Introduction
Objective of This Course
Discrete Mathematics CS 2610
University of South Florida and Eindhoven University of Technology
Chapter 11 Limitations of Algorithm Power
CSC 380: Design and Analysis of Algorithms
NP-Completeness Reference: Computers and Intractability: A Guide to the Theory of NP-Completeness by Garey and Johnson, W.H. Freeman and Company, 1979.
4-9问题的形式化描述.
MA5242 Wavelets Lecture 1 Numbers and Vector Spaces
Algorithms CSCI 235, Spring 2019 Lecture 36 P vs
Chapter 3: Simplicial Homology Instructor: Yusu Wang
SMALL 4-QUASINORMAL SUBGROUPS
Complexity Theory: Foundations
Mathematical Background: Extension Finite Fields
Presentation transcript:

Complexity of Decision Problems in Polycyclic Groups Delaram Kahrobaei New York City College of Technology City University of New York Cryptography and Combinatorial Group Theory Seminar Graduate Center Cryptography Sub Seminar February 15 th 2008

Braid Group Presentation

Polycyclic Groups A group is called polycyclic if there exists a polycyclic series through the group; i.e. a subnormal series of finite length with cyclic factors 1 = G 0 q G 1 q … q G n = G G i+1 /G i is cyclic Polycyclic Presentation P = h a 1,…, a n | a j a i = w ij, a j a i -1 = v ij, a k r k = u kk i 1 · i < j · n, k 2 I ½ {1,…,n}, r i 2 N, i 2 I w ij, v ij, u jj words in generators a j+1,…, a n By induction: 8 w 2 P; w = a 1 e 1 … a n e n (normal form) e i 2 Z & 0 · e i · r i if i 2 I

8 polycyclic group has a consistent polycyclic presentation! PC presentation is consistent if: 8 element in the group defined by the presentation can be represented uniquely by a word of the form a 1 e 1 … a n e n (Normal Form) (e i 2 Z, 0 <e i < r i, i 2 I) ‘basis for computations w/ polycyclic groups’

PCP(P)>> CP(P) >> WP(P) Word Problem in Polycyclic Groups Solved effectively using collection algorithm. Implemented in GAP and MAGMA (practical). Conjugacy Problem in Polycyclic Groups Algorithm by Eick-Ostheimer. Implemented in GAP and KANT (not efficient) Search Conjugacy Problem in any subgroup of the General Linear group is solvable is conjectured to be exponential. Power Conjugacy Problem in Polycyclic Groups is an open question!

WP in Polycyclic groups collection algorithm WP in consistent PC presentation solved “effectively” using collection algorithm. Computes: unique normal word for an arbitrary word in the generators. basic idea: applies iteratedly the power and conjugate relations of the given presentation to subwords of a given word modifies the given word. The nature of the relations asserts that an iteration of this process will eventually produce a normal word.

Complexity of Collection Algorithm Complexity depend on the growth of exponents e j of generators g i j occurring in intermediate stages of the algorithm while processing the word g i 1 e 1 … g i l e l Growth can be bounded above if the considered group is finite. In infinite PC groups: risk of an integer explosion inherent in the collection algorithm. In praxis, collection is known as an effective method to solve WP in consistent polycyclic presentations. Implemented in GAP and MAGMA and it has proved to be practical for finite and infinite polycyclic groups.

Collect Word

Example of Collection Algorithm G = h g 1,…, g 4 | g 1 3 = g 4, g 2 g 1 =g 2 -1, g 3 g 1 = g 3 -1, g 3 g 2 = g 3 g 4 2, g 3 g 2 -1 = g 3 g 4 -2 i where all the omitted conjugate relations are trivial. We collect the word g 2 g 1 3. g 2 g 1 3 = g 2 g 4 by applying the power relation of g 1.

Multiple Conjugacy Problem AKE can be broken if an effective algorithm to determine a multiple conjugating element a with r i a = s i (1 · I · m) can be found (knowing that such an element exists) Multiple CP reduces to the single CP.

Single Conjugacy Problem Non-commutative DH and AKE can be broken if an effective algorithm to determine a conjugating element r a = s for given r, s 2 G can be found. For AKE additional computation of C G (s) is necessary. It has been proved there exists an algorithm to compute such a conjugating element and such a centralizer in a polycyclic group. Implemented in GAP & KANT.

Algorithm for single CP The algorithm uses induction down along a normal series with elementary or free abelian factors of the considered group G. The steps corresponding to finite factors in the series can be solved by an application of an orbit-stabilizer algorithm as typical for finite groups. The steps corresponding to infinite factors require: [a)] Methods from representation theory such as the computation of submodule series. [b)] Methods from algebraic number theory such as the computation of unit groups. [c)] Methods from finite polycyclic groups such as the finite orbit-stabilizer algorithm.

Growth Rate of Polycyclic Groups A large growth rate would imply a large key space for the set of all possible keys, thus making the brute force search of this space intractable. Ideally, we would like to use groups which exhibit provably exponential growth. A large class of polycyclic groups are known to have an exponential growth rate (Wolf and Milnor).

Experiment Running time h(G)WPCP sec9.96 sec sec9.37 sec sec10.16 sec sec> 100 hrs

Example of Polycyclic Groups K = Q [x]/(f): algebraic number field for a cyclotomic polynomial f w (w is a primitive r-th root of unity) deg (f w ) =  (n). Maximal order O of K is a ring whose additive group is isomorphic to Z n. Unit group U of K: f.g. abelian group Natural split extension G(w) = O o U Metabelian polycyclic group.

Some Known Complexity Result The complexity of word problem in Nilpotent groups is in Polynomial time, indeed it is almost linear. (Holt, Gersten, Riley) Word Problem is in NP for any finitely generated metabelian groups. (Arzhantseva, Osin)