Zobrazeno 1 - 10
of 279
pro vyhledávání: '"Algebraic cryptanalysis"'
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2024, Iss 4 (2024)
Gröbner basis cryptanalysis of hash functions and ciphers, and their underlying permutations, has seen renewed interest recently. Anemoi (Crypto’23) is a permutation-based hash function that is efficient for a variety of arithmetizations used in z
Externí odkaz:
https://doaj.org/article/c04601b09d4b4b77a79833dfe0d2239d
Autor:
Fadila Paradise, Kiki Ariyanti Sugeng
Publikováno v:
InPrime, Vol 5, Iss 2, Pp 136-143 (2023)
Abstract Algebraic cryptanalysis is a cryptanalysis method that aims to exploit the algebraic structure of an encryption algorithm to obtain the secret key. Algebraic cryptanalysis becomes interesting because it uses a small amount of known plaintext
Externí odkaz:
https://doaj.org/article/9ad3d30febf841e1b6d0dcf60cd726bf
Publikováno v:
Journal of Mathematical Cryptology, Vol 17, Iss 1, Pp 1-5 (2023)
In this article, we analyze two digital signature schemes, proposed in Moldovyan et al., that use finite noncommutative associative algebras as underlying platforms. We prove that these schemes do not possess the claimed property of being quantum saf
Externí odkaz:
https://doaj.org/article/eff3810a14e2465aa98349b5a2527414
Publikováno v:
IEEE Access, Vol 11, Pp 120319-120333 (2023)
In this paper we describe a class of cryptographic guess-and-determine attacks which is based on the notion of a linearizing set. A linearizing set-based attack is applied to a system of Multivariate Quadratic equations (MQ) over $GF(2)$ field, which
Externí odkaz:
https://doaj.org/article/802348ddaee44846909b10d0549ea512
Autor:
Zhaocun ZHOU, Dengguo FENG
Publikováno v:
Tongxin xuebao, Vol 43, Pp 183-198 (2022)
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techni
Externí odkaz:
https://doaj.org/article/edb2ceecb1884e6cbadcaa79919f8eac
Publikováno v:
PeerJ Computer Science, Vol 9, p e1521 (2023)
Cybersecurity guarantees the exchange of information through a public channel in a secure way. That is the data must be protected from unauthorized parties and transmitted to the intended parties with confidentiality and integrity. In this work, we m
Externí odkaz:
https://doaj.org/article/eb797cca5be5415eb012ecf4ab033a35
Publikováno v:
Symmetry, Vol 15, Iss 8, p 1563 (2023)
The rise of modern cryptographic protocols such as Zero-Knowledge proofs and secure Multi-party Computation has led to an increased demand for a new class of symmetric primitives. Unlike traditional platforms such as servers, microcontrollers, and de
Externí odkaz:
https://doaj.org/article/1830fedf03464808bfdbdd118f256c48
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2022, Iss 3 (2022)
Recent advanced Zero-Knowledge protocols, along with other high-level constructions such as Multi-Party Computations (MPC), have highlighted the need for a new type of symmetric primitives that are not optimized for speed on the usual platforms (desk
Externí odkaz:
https://doaj.org/article/c10f74f1911a431c90a428f14f07b7e4
Autor:
Pavol Zajac
Publikováno v:
Cryptography, Vol 7, Iss 2, p 19 (2023)
In this work, we survey the existing research in the area of algebraic cryptanalysis based on Multiple Right-Hand Sides (MRHS) equations (MRHS cryptanalysis). MRHS equation is a formal inclusion that contains linear combinations of variables on the l
Externí odkaz:
https://doaj.org/article/a151272d0b424f5bace69935cd67bb8c
Autor:
Wan Nur Aqlili Ruzai, Muhammad Rezal Kamel Ariffin, Muhammad Asyraf Asbullah, Zahari Mahad, Athirah Nawawi
Publikováno v:
IEEE Access, Vol 8, Pp 80997-81006 (2020)
Let N = pq be an RSA modulus where p and q are primes not necessarily of the same bit size. Previous cryptanalysis results on the difficulty of factoring the public modulus N = pq deployed on variants of RSA cryptosystem are revisited. Each of these
Externí odkaz:
https://doaj.org/article/787ffefdca444b3aa2de92dbc9f01ec8