Classical linear ciphers, such as the Hill cipher, operate on fixed, finite-dimensional modules and are therefore vulnerable to straightforward known-plaintext attacks that recover the key as a fully determined linear operator. We propose a symmetric-key cryptosystem whose linear action takes place instead in the Burnside ring $A(G)$ of a compact Lie group $G$, with emphasis on the case $G=O(2)$. The secret key consists of (i) a compact Lie group $G$; (ii) a secret total ordering of the subgroup orbit-basis of $A(G)$; and (iii) a finite set $S$ of indices of irreducible $G$-representations, whose associated basic degrees define an involutory multiplier $k\in A(G)$. Messages of arbitrary finite length are encoded as finitely supported elements of $A(G)$ and encrypted via the Burnside product with $k$. For $G=O(2)$ we prove that encryption preserves plaintext support among the generators $\{(D_1),\dots,(D_L),(SO(2)),(O(2))\}$, avoiding ciphertext expansion and security leakage. We then analyze security in passive models, showing that any finite set of observations constrains the action only on a finite-rank submodule $W_L\subset A(O(2))$, and we show information-theoretic non-identifiability of the key from such data. Finally, we prove the scheme is \emph{not} IND-CPA secure, by presenting a one-query chosen-plaintext distinguisher based on dihedral probes.
- Paper ID: 2510.10901
- Title: A Symmetric-Key Cryptosystem Based on the Burnside Ring of a Compact Lie Group
- Author: Ziad Ghanem
- Classification: cs.CR (Cryptography and Security), math.RA (Rings and Algebras)
- Publication Date: October 13, 2025 (arXiv preprint)
- Paper Link: https://arxiv.org/abs/2510.10901
Traditional linear ciphers (such as the Hill cipher) operate on fixed finite-dimensional modules and are therefore vulnerable to direct known-plaintext attacks, where attackers can recover completely determined linear operator keys through linear algebra methods. This paper proposes a symmetric-key cryptosystem whose linear operations are performed in the Burnside ring A(G) of a compact Lie group G, with particular focus on the case G = O(2). The key consists of three components: (i) a compact Lie group G; (ii) a secret total order on the orbit basis of subgroup conjugacy classes of A(G); (iii) a finite set S of indices of irreducible G-representations, whose associated fundamental degrees define an involutory multiplier k ∈ A(G). Arbitrary finite-length messages are encoded as finitely supported elements of A(G) and encrypted via the Burnside product with k.
- Vulnerability of Traditional Linear Ciphers: Classical linear ciphers such as the Hill cipher operate in fixed finite-dimensional spaces, allowing attackers to construct systems of linear equations by collecting sufficient plaintext-ciphertext pairs, thereby completely recovering the key.
- Post-Quantum Cryptography Requirements: The threat of quantum computing has motivated researchers to seek cryptographic primitives based on non-traditional number-theoretic assumptions, including schemes based on group theory and graph theory.
- Fundamental Limitations of Finite-Dimensional Platforms: Although existing algebraic cryptosystems provide important alternatives, they still operate on finite-dimensional platforms with conceptual vulnerabilities—sufficient plaintext-ciphertext pairs can completely constrain the key operator.
The core motivation of this paper is to transcend the limitations of finite-dimensional settings by transferring encryption operations to infinite-rank modules—the Burnside ring of compact Lie groups—thereby theoretically avoiding the fundamental weaknesses of traditional linear ciphers.
- Proposed a Novel Symmetric Cryptosystem Based on the Burnside Ring: First application of the Burnside ring of compact Lie groups to cryptography, particularly for the O(2) group.
- Proved Support-Preserving Property: For G = O(2), proved that the encryption process preserves the support of plaintext in the generators {(D₁),...,(D_L),(SO(2)),(O(2))}, avoiding ciphertext expansion and security leakage.
- Established Security Analysis in the Passive Model: Proved that any finite observation set can only constrain operations on a finite-rank submodule W_L ⊂ A(O(2)), and demonstrated information-theoretic unidentifiability of the key from finite data.
- Proved IND-CPA Insecurity: Through a single-query chosen-plaintext distinguisher based on dihedral probing, proved that the scheme does not satisfy IND-CPA security.
Design a symmetric-key encryption scheme where:
- Input: Arbitrary finite-length messages
- Output: Encrypted elements in the Burnside ring
- Constraint: Utilize infinite-dimensional structure to resist traditional linear algebra attacks
For a compact Lie group G, the Burnside ring A(G) is defined as:
- Basis: The set of conjugacy classes of subgroups Φ₀(G) = {(H) : H ≤ G, W(H) is finite}
- Structure: Free Z-module A(G) = ZΦ₀(G)
- Product: Burnside product defined through orbit counting
For G = O(2), the basis elements include:
- (O(2)): The conjugacy class of the group itself
- (SO(2)): The conjugacy class of the special orthogonal group
- (Dₖ): Conjugacy classes of finite dihedral subgroups, k ≥ 1
The multiplication rules are shown in the table:
| · | (O(2)) | (SO(2)) | (Dₘ) |
|---|
| (O(2)) | (O(2)) | (SO(2)) | (Dₘ) |
| (SO(2)) | (SO(2)) | 2(SO(2)) | 0 |
| (Dₖ) | (Dₖ) | 0 | 2(D_l), l=gcd(k,m) |
The key consists of a triple (G, O, S) where:
- Group G: A compact Lie group, such as G = O(2)
- Order O: A secret total order on the basis elements Φ₀(G)
- Representation Index Set S: A finite set S = {k₁, k₂, ..., kₘ}
Construct the key element from the set S:
k=∏j∈SdegVj
where deg_ is the fundamental degree of the j-th irreducible representation. For O(2):
- deg_ = (O(2)) (trivial representation)
- deg_ = (O(2)) - (Dₘ) (non-trivial representation)
- Preprocessing: Convert raw data to an integer vector p⃗ ∈ Z^L
- Ring Encoding: Use the secret order O to map the vector to p ∈ A(G)
- Encryption: Compute ciphertext c = p · k
- Transmission: Send the finitely supported ciphertext
- Decryption: Since k is involutory, compute p = c · k
- Decoding: Recover the original data
- Infinite-Dimensional Platform: Transcend finite-dimensional limitations by operating in infinite-rank modules
- Involutory Property: The key element k satisfies k² = (O(2)), simplifying the decryption process
- Support Preservation: Encryption does not increase the maximum dihedral index of plaintext, avoiding ciphertext expansion
Proposition 3.1: Let the plaintext be p = Σᵢ₌₁ᴸ aᵢ(Dᵢ). If the key k is a product of arbitrary fundamental degrees, then the ciphertext c = p·k is also an element of the submodule Z{(D₁),...,(D_L)}.
Proof Outline:
- (Dᵢ)·(O(2)) = (Dᵢ)
- (Dᵢ)·(Dₘ) = 2(D_{gcd(i,m)})
- Since gcd(i,m) ≤ i ≤ L, the result's support does not exceed the original range
Any finite observation set {pⱼ, cⱼ} is restricted to a finite-rank submodule:
WL:=Z[{(D1),...,(DL)}]⊂A(O(2))
Proposition 4.1: Let S = {s₁,...,sₘ} be the key set, and q be a prime with q > L. Construct S' = {s₁q,...,sₘq}. Then k_S and k_{S'} generate the same linear transformation on W_L.
Corollary 4.1: For any finite observation set in W_L, there exist infinitely many distinct key sets consistent with the observations. The key is information-theoretically unidentifiable.
For query p = (Dₓ), the ciphertext is:
cx=(Dx)⋅kS=(Dx)+∑n≥12αS(n)(Dgcd(x,n))
where α_S(n) is determined by the formula given in Proposition 2.1.
Proposition 4.2: For any two distinct key sets S₀ ≠ S₁, there exists x ∈ ℕ such that (Dₓ)·k_{S₀} ≠ (Dₓ)·k_{S₁}.
Single-Query Distinguisher:
- Compute β_{S₀}(x) and β_{S₁}(x)
- Select x satisfying β_{S₀}(x) ≠ β_{S₁}(x)
- Query p = (Dₓ) and determine the key based on coefficients
- Resistance to Passive Attacks: The key possesses information-theoretic unidentifiability under ciphertext-only and known-plaintext attacks
- No Ciphertext Expansion: The support-preserving property avoids ciphertext expansion
- Theoretical Innovation: First application of algebraic topology tools to cryptography
- Does Not Satisfy IND-CPA: Deterministic linear construction cannot achieve standard indistinguishability
- Practical Constraints: Complex mathematical structures may impact implementation efficiency
- Limited Application Scenarios: Primarily suitable for scenarios requiring passive security but accepting deterministic encryption
- Hill cipher and its variants
- Vulnerability analysis of finite-dimensional linear transformations
- Permutation group mapping (PGM) cryptosystems
- Graph-theoretic symmetric block ciphers
- Minimum spanning tree (MST) and adjacency matrix methods
- Applications of group theory in cryptography
- Representation theory and equivariant degree theory
- Successfully constructed a symmetric cryptosystem based on the infinite-dimensional Burnside ring
- Demonstrated theoretical security under the passive attack model
- Proved fundamental limitations of deterministic linear schemes
- Non-Deterministic Extensions: Introduce randomization to avoid CPA attacks
- Other Lie Groups: Explore cryptographic properties of different compact Lie groups
- Implementation Optimization: Develop efficient algorithms for Burnside ring operations
- Hybrid Schemes: Combine traditional cryptographic techniques to enhance practicality
- Theoretical Breakthrough: First application of Burnside ring theory to cryptography
- Conceptual Innovation: Transcends the fundamental limitations of finite-dimensional platforms
- Mathematical Depth: Integrates algebraic topology, representation theory, and cryptography
- Rigorous mathematical proofs and theoretical analysis
- Comprehensive security evaluation framework
- Clear description of attack and defense mechanisms
- Provides new perspectives for post-quantum cryptography
- Demonstrates the potential of pure mathematical theory in applications
- Provides a case study for understanding limitations of deterministic encryption
- Does not satisfy modern cryptographic security definitions
- Implementation complexity may be high
- Application scenarios are relatively limited
This paper represents an interesting attempt at cross-disciplinary research between cryptography and pure mathematics. While limited in practical applicability, it provides valuable theoretical contributions to the field.