Riccardo Aragona


Coppito 1, Room 1054

During Ph.D., my research interests are been focused upon two specific topics: representations of finite-dimensional algebras and quiver representations. In particular, I  studied the behavior of the invariants for the actions of products of classical groups on the variety of symmetric quiver representations. Moreover I went into more depth the theory of Cluster algebras and the theory of Cluster Categories.

Then I worked with Alessandro D'Andrea ("Sapienza" University of Rome) and Francesco Vaccarino (Politecnico di Torino) about the connection of Representation theory with Algebraic Statistics (applied to Phylogenetics), Computer Science and Dynamical Systems (applied to modeling and simulations of natural, biological and social systems). In particular, we studied Sequential Dynamical Systems (SDS), using  techniques regarding Representation Theory and Semigroup Theory. Together with Alessandro D'Andrea we then continued these studies.

Currently I am dealing with some aspects of Algebraic Cryptography, I am mainly focusing on the application of Group Theory to Symmetric Cryptography; in particular, I am interested on the following topics:

Group Theory and Symmetric Cryptography. We study the groups generated by the encryption functions of block ciphers, as AES and PRESENT, and other block ciphers in which the action of Key Space is different to translation, as GOST. Moreover, we describe some properties of the components, both linear and non-linear, acting within block ciphers useful to prevent some their weaknesses. We have also designed a new block cipher structure (Wave-shaped ciphers) within which it is possible to insert a non-linear component  optimal from the point of view of differential cryptanalysis and then we proved to be resistant to some algebraic attacks based on Group Theory. We also showed that the group generated by the round functions of the AES cipher cannot be embedded into a linear group acting on a vector space W, unless the dimension of W is huge, making this embedding useless in practice. Recently, we studied the relationships between the elementary abelian regular subgroups and the Sylow 2-subgroups of their normalisers in the symmetric group Sym(F_n^2), in view of the interest for their applications in symmetric cryptography.

Fully Homomorphic Encryption (FHE). We computed two bounds on the size of the secret key for the FHE scheme over the integers of van Dijk et al. (DGHV scheme) to decrypt correctly a ciphertext after a fixed number of additions and a fixed number of multiplication. Moreover we improve the original bound on the dimension of the secret key for a general circuit.

Cryptanalysis on block ciphers. We introduce a slight improvement to the Partial Sum Attack (one of the most powerful attacks, independent of the key schedule, against reduced-round versions of AES) which lowers the number of chosen plaintexts needed to successfully mount it and which can be carried out completely in practice.

Asymmetric Cryptography. We provided a rigorous analysis of the RSA cryptographic keys employed in the Certification Authority (CA) to certify the keys exchange during some financial transactions. In particular, we provide an attacker model useful to determine the optimal length and cryptoperiod of RSA moduli used by such CAs. In detail, we base our analysis on the execution times of the attacks known in literature, which depend also on the computational power of the attacker.

Attribute Based Encryption. We proposed a new key-policy revocable-storage attribute- based encryption (RS-ABE) scheme, i.e. a public-key encryption scheme which employs some attributes to manage the access to a certain document using a  keys depending on these attributes and in which we introduce user revocation. Moreover, we prove its security in term of indistinguishability under a chosen-plaintext attack (IND-CPA).

Tokenization. We proposed a tokenization algorithm and we provide some formal proofs of security for it, which imply our algorithm satisfies the most signicant security requirements described in  tokenization guide-lines of Payment Card Industry Security Standard Council (PCI SSC).

Information Theory. We derived from the entropy theorem a simple proof of a pointwise inequality first stated by Ornstein and Shields.

No data avilable

R. Aragona, M. Calderini, R. Civino,  Some Group-Theoretical Results on Feistel  Network in a  Long-Key Scenario, accepted for publication in Advances in Mathematics of Communications, 2020.

R. Aragona, F. Marzi, F. Mignosi, M. Spezialetti, Entropy and Compression: A Simple Proof of an Inequality of Khinchin-Ornstein-Shields, Problems of Information Transmission, 56(1), 13-22 (2020).

R. Aragona, R. Civino, N. Gavioli, C. M. Scoppola, Regular subgroups with large intersection, Annali di Matematica Pura ed Applicata, 198(6) , 2043-2057 (2019).

R. Aragona, A. Meneghetti, Type-Preserving Matrices and Security of Block Ciphers,  Advances in Mathematics of Communications 13(2),  235-251(2019).

R. Aragona, M. Calderini, R. Civino, M. Sala, I. Zappatore, Wave-Shaped Round Functions and Primitive Groups,  Advances in Mathematics of Communications, 13(1),  67-88 (2019).

R. Aragona, F. Giacon, M. Sala, A proof of security for a key-policy RS-ABE scheme,  JP Journal of Algebra, Number Thoery and Applications 40(1), pp. 29 - 90 (2018).

R. Aragona, A. Rimoldi, M. Sala, A note on an infeasible linearization of some block ciphers,  Journal of Discrete Mathematical Sciences and Cryptography 21(1), pp. 209-218 (2018).

R. Aragona, M. Calderini, A. Tortora, M. Tota, Primitivity of PRESENT and other lightweight  ciphers,  Journal of Algebra and Its Applications 17(6), 1850115  (2018), [16 pages].

R. Aragona, R. Longo,   M. Sala, Several Proofs of Security for a Tokenization Algorithm, Applicable Algebra in Engineering, Communication and Computing 28(5), pp. 425-436 (2017).

R. Aragona, A. Caranti, M. Sala, The group generated by the round functions of a GOST-like cipher, Annali di Matematica Pura ed Applicata 196(1),  pp. 1-17 (2017).

M. Calderini, D. Maccauro, R. Aragona,  M. Sala, On weak differential uniformity of vectorial Boolean functions as acryptographic criterion,  Applicable Algebra in Engineering, Communication and Computing 27(5), pp. 359-372 (2016).

R. Aragona, F. Gozzini, M. Sala, A real life project in Cryptography: assessment of RSA keys, in Physical and Data-Link Security Techniques for Future Communication Systems, Springer LNEE, Vol. 358, pp. 197-203, (2015).

F. Aldà, R. Aragona, L. Nicolodi, M. Sala, Implementation and improvement of the Partial Sum Attack on 6-round AES,  in Physical and Data-Link Security Techniques for Future Communication Systems, Springer LNEE, Vol. 358, pp. 181-195, (2015).

F. Marinelli, R. Aragona, C. Marcolla , M. Sala, Some security bounds for the key sizes of DGHV scheme,  Applicable Algebra in Engineering, Communication and Computing 25(5), pp. 383-392 (2014). 

R. Aragona, A. Caranti, F. Dalla Volta, M. Sala, On the group generated by the round functions of translation based ciphers over arbitrary finite fields, Finite Fields and Their Applications 25, pp. 293-305 (2014). 

R. Aragona, A. D'Andrea, Hecke-Kiselman Monoids of Small Cardinality, Semigroup Forum 86(1), pp. 32-40 (2013). 

R. Aragona, Semi-invariants of Symmetric Quivers of Finite Type, Algebras and Representation Theory 16(4), pp. 1051-1083 (2013). 

R. Aragona, Semi-invariants of Symmetric Quivers of Tame Type, Algebras and Representation Theory 15(6), pp. 1215-1260 (2012). 

R. Aragona, Semi-invarianti di quiver simmetrici, nota relativa all'argomento della tesi di dottorato, textit{Bollettino dell'Unione Matematica Italiana. Sez. A: La Matematica nella Società e nella Cultura}, Serie I Vol. III N. 1 (Aprile 2010), pp. 11-14.