We briefly explain how to implement the morphisms in our paper ``Natural representations of black box groups encrypting $SL_2(\mathbb{F})$" and provide some examples.
- Paper ID: 2510.14569
- Title: An implementation of the morphisms SL2(F)→SL2(K)→X
- Authors: Alexandre Borovik, Şükrü Yalçınkaya
- Classification: math.GR (Group Theory)
- Publication Date: October 16, 2025
- Paper Link: https://arxiv.org/abs/2510.14569
This paper briefly explains how to implement the morphisms from the paper "Natural representations of black box groups encrypting SL2(F)" and provides several concrete examples. The authors provide a complete GAP implementation code, available on GitHub.
The core problem addressed in this paper is the construction and implementation of morphisms of black box groups:
SL2(F)→SL2(K)→X
where:
- SL2(F) is the group of 2×2 matrices with determinant 1 over a finite prime field F (odd characteristic)
- X is a black box group encrypting SL2(F)
- SL2(K) is the group of 2×2 matrices with determinant 1 over a black box field K (encrypting F)
- Practical applications in computational group theory: Black box group algorithms have important implications in cryptography and computational complexity theory
- Theory-to-practice conversion: Translating abstract group-theoretic constructions into executable algorithms
- Efficient computation over large fields: Optimization specifically for groups over very large finite fields
- Handling black box groups with unknown structure
- Constructing field operations without knowledge of the field structure
- Implementing complex group-theoretic construction algorithms
- Complete GAP implementation: Converting theoretical algorithms into runnable code
- Black box implementation of PGL2: Construction via diagonal embedding and semidirect product
- Concrete computation of morphisms: Including element decomposition and map construction
- Verification framework: Verifying correctness through order comparison and Chevalley commutation relations
Given a black box group X≅SL2(F), where F is an unknown finite prime field, construct explicit morphisms:
- SL2(F)→SL2(K): from a known group to a group over a black box field
- SL2(K)→X: from a group over a black box field to the original black box group
First, construct PGL2(F) through the following steps:
- Torus construction: Construct two tori S and R in X, where a diagonal automorphism α centralizes S and inverts R
- Diagonal embedding: Define
X~={(x,xα)∣x∈X}
- Semidirect product: Construct Y=X~⋊⟨α⟩≅PGL2(F)
Elements in Y are represented as:
- (x,xα,0): belonging to the coset X~
- (x,xα,1): belonging to the coset X~α
Group multiplication rules:
- (x,xα,0)∘(y,yα,0)=(xy,xαyα,0)
- (x,xα,0)∘(y,yα,1)=(xy,xαyα,1)
- (x,xα,1)∘(y,yα,0)=(xyα,xαy,1)
- (x,xα,1)∘(y,yα,1)=(xyα,xαy,0)
- Black box field construction: Constructing field operations through group-theoretic methods without knowledge of the field structure
- Change of basis matrices: Implementing transformation from SO3♯ to SO3♭
- Element decomposition algorithm: Decomposing 2×2 matrices into products of unipotent elements
- Computing system: GAP (Groups, Algorithms, Programming)
- Test group: SL2(997) (997 is prime)
- Field size constraint: The algorithm requires the base field size to be at least 13
- SetUpForPGL2("S", "Eo")
- Input: Generator set S and odd part of exponent Eo
- Output: All tools necessary for constructing PGL2
- ToolBoxSL2("S", "E")
- Input: Generator set S and arbitrary exponent E
- Output: Toolbox list containing 12 items
- SharpVsFlat("TB")
- Input: Output of ToolBoxSL2
- Output: Change of basis matrix
- Order comparison: Verifying that the original element and its image have the same order
- Chevalley commutation relations: Verifying that Chevalley generators satisfy the correct commutation relations
The paper demonstrates concrete execution examples:
- Element mapping examples:
- Input: Random elements in SL2(997)
- Output: Their images in the black box group X
- Verification: Both have the same order
- Algorithm efficiency: The algorithm can handle groups over large fields, but certain steps (such as square root computation) may require considerable time
- Correctness verification: Testing with multiple random elements verifies the correctness of the mapping
- Computational complexity: Construction of the change of basis matrix involves square root computation of black box field elements, which may be time-consuming due to poor random choices
- Scalability: The algorithm is designed to handle very large finite fields
This implementation is based on the authors' previous theoretical work:
- 1 Borovik & Yalçınkaya (2018): Adjoint representations of black box groups PSL₂(Fq)
- 2 Borovik & Yalçınkaya: Natural representations of black box groups encrypting SL₂(F)
- Utilizing projective geometry and group action theory
- Employing standard construction methods for Chevalley groups
- Combining modern techniques in computational group theory
- Successful implementation of theoretical algorithms: Converting complex group-theoretic constructions into practical computational tools
- Effectiveness of verification framework: Algorithm correctness verified through order comparison and commutation relations
- Feasibility of large field computation: The algorithm can handle large finite fields in practical applications
- Field size constraint: Requires base field size to be at least 13
- Computational efficiency: Certain steps may be time-consuming due to randomness
- Prime field limitation: Current implementation supports only prime fields, not field extensions
- Implementation of inverse morphisms: Authors promise to release implementation of inverse morphisms
- Extension field support: Extending the algorithm to support finite field extensions
- Efficiency optimization: Improving randomized algorithms to reduce computation time
- Theory-practice integration: Successfully converting abstract group-theoretic results into executable code
- Open source contribution: Providing complete GitHub code repository for reproducibility and extension
- Detailed documentation: Clear usage instructions and examples provided
- Comprehensive verification: Algorithm correctness verified through multiple methods
- Documentation conciseness: As an implementation note, theoretical background introduction is relatively brief
- Missing performance analysis: Lacks detailed time complexity analysis
- Limited test coverage: Only limited test cases are demonstrated
- Computational group theory field: Providing practical tools for black box group algorithms
- Cryptographic applications: Potential applications in group-based cryptographic systems
- Educational value: Providing concrete examples for learning computational group theory
- Group computation over large finite fields
- Structural analysis of black box groups
- Group-theoretic implementation of cryptographic protocols
- Teaching and research in computational group theory
1 Alexandre Borovik and Şükrü Yalçınkaya, Adjoint representations of black box groups PSL₂(Fq), J. Algebra 506 (2018), 540–591.
2 Alexandre Borovik and Şükrü Yalçınkaya, Natural representations of black box groups encrypting SL₂(F), arxiv.org/abs/2001.10292.
Technical Note: This paper is a technical report of implementation nature, focusing on converting theoretical algorithms into practical tools. Although relatively brief, it provides complete code implementation and usage guidelines, offering significant practical value to the computational group theory field.