Results 21 to 30 of about 284 (159)
Algebraic Cryptanalysis of the PKC’2009 Algebraic Surface Cryptosystem [PDF]
In this paper, we fully break the Algebraic Surface Cryptosystem (ASC for short) proposed at PKC’2009 [3]. This system is based on an unusual problem in multivariate cryptography: the Section Finding Problem. Given an algebraic surface $X(x,y,t)\in\mathbb{F}_p[x,y,t]$ such that $\deg_{xy} X(x,y,t)= w$, the question is to find a pair of polynomials of ...
Jean-Charles Faugère +1 more
openaire +2 more sources
Cryptanalysis of an Algebraic Privacy Homomorphism [PDF]
We use linear algebra to show that an algebraic privacy homomorphism proposed by Domingo-Ferrer is insecure for some parameter settings.
openaire +2 more sources
New cryptanalysis of LowMC with algebraic techniques
AbstractLowMC is a family of block ciphers proposed by Albrecht et al. at EUROCRYPT 2015, which is tailored specifically for FHE and MPC applications. At ToSC 2018, a difference enumeration attack was given for the cryptanalysis of low-data instances of full LowMCv2 with few applied S-boxes per round.
Wenxiao Qiao +4 more
openaire +1 more source
Algebraic Analysis of a Simplified Encryption Algorithm GOST R 34.12-2015
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik.
Evgenia Ishchukova +2 more
doaj +1 more source
Transformation Method for Solving System of Boolean Algebraic Equations
In recent years, various methods and directions for solving a system of Boolean algebraic equations have been invented, and now they are being very actively investigated. One of these directions is the method of transforming a system of Boolean algebraic
Dostonjon Barotov +6 more
doaj +1 more source
This paper considers a new method for obtaining an S-box, which is one of the nonlinear transformations used in modern block-symmetric cipher systems.
Ardabek Khompysh +4 more
doaj +1 more source
Algebraic fault attack on PRESENT
A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis ...
Ke-hui WU +4 more
doaj +2 more sources
Algebraic Cryptanalysis Scheme of AES-256 Using Gröbner Basis
The zero-dimensional Gröbner basis construction is a crucial step in Gröbner basis cryptanalysis on AES-256. In this paper, after performing an in-depth study on the linear transformation and the system of multivariate polynomial equations of AES-256 ...
Kaixin Zhao, Jie Cui, Zhiqiang Xie
doaj +1 more source
Enhancing E‐Commerce Security Based on Involution Function Using Twin Key AES Cipher
In the realm of surging e‐commerce data and increasing digital transactions, ensuring end‐to‐end security is paramount to protect sensitive information and maintain user trust. The Advanced Encryption Standard (AES), a cornerstone of network security, relies on symmetric key encryption for secure communication.
Biresh Kumar +11 more
wiley +1 more source
(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley +1 more source

