Results 21 to 30 of about 458 (184)

A Practical Cryptanalysis of the Algebraic Eraser [PDF]

open access: bronze, 2016
15 pages. Updated references, with brief comments added. Minor typos corrected.
Adi Ben-Zvi   +2 more
openalex   +3 more sources

Translation of Algorithmic Descriptions of Discrete Functions to SAT with Applications to Cryptanalysis Problems [PDF]

open access: yesLogical Methods in Computer Science, 2020
In the present paper, we propose a technology for translating algorithmic descriptions of discrete functions to SAT. The proposed technology is aimed at applications in algebraic cryptanalysis. We describe how cryptanalysis problems are reduced to SAT in
Alexander Semenov   +4 more
doaj   +1 more source

A Substitution Box for Lightweight Ciphers to Secure Internet of Things

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security.
V. Panchami, Mahima Mary Mathews
doaj   +1 more source

Algebraic and quantum attacks on two digital signature schemes

open access: yesJournal of Mathematical Cryptology, 2023
In this article, we analyze two digital signature schemes, proposed in Moldovyan et al., that use finite noncommutative associative algebras as underlying platforms.
Roman’kov Vitaly   +2 more
doaj   +1 more source

Algebraic Cryptanalysis of McEliece Variants with Compact Keys [PDF]

open access: bronze, 2010
In this paper we propose a new approach to investigate the security of the McEliece cryptosystem. We recall that this cryptosystem relies on the use of error-correcting codes. Since its invention thirty years ago, no efficient attack had been devised that managed to recover the private key.
Jean‐Charles Faugère   +3 more
openalex   +3 more sources

A new representation of S-boxes for algebraic differential cryptanalysis

open access: greenRad Hrvatske akademije znanosti i umjetnosti Matematičke znanosti, 2021
Algebraic cryptanalysis can be used to break (small versions of) block ciphers with small data complexity. If we have access to a large number of P-C pairs, algebraic cryptanalysis can be combined with differential techniques. Differential characteristic produces extra linear equations, which can be used to augment the original algebraic system. In our
Alena Bednáriková, Pavol Zajac
openalex   +4 more sources

Algebraic Precomputations in Differential Cryptanalysis

open access: yes, 2010
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes. Algebraic techniques have been successfully applied against a number of multivariate schemes and stream ciphers. Yet, their feasibility against block ciphers remains the source of much speculation.
Albrecht, Martin   +4 more
openaire   +15 more sources

Survey on approaches of stream cipher cryptanalysis

open access: yesTongxin xuebao, 2022
Cryptanalysis plays an essential role in the design of ciphers algorithm.Based on this, the common approaches were reviewed and investigated to clarify their relations.These approaches were categorized into four classes according to their main techniques,
Zhaocun ZHOU, Dengguo FENG
doaj   +2 more sources

Algebraic Cryptanalysis of Ascon Using MRHS Equations

open access: goldTatra Mountains Mathematical Publications
Abstract Ascon is a family of lightweight authenticated encryption and hashing algorithms, which is a finalist in the NIST Lightweight Cryptography competition. We study the Ascon algorithm from the perspective of algebraic cryptanalysis based on the MRHS representation of the cipher. We call such an approach an MRHS cryptanalysis.
Miloslav Smičík, Pavol Zajac
openalex   +3 more sources

Algebraic Side Channel Attack on Trivium and Grain Ciphers

open access: yesIEEE Access, 2017
Solving a system of multivariate quadratic equations obtained through algebraic cryptanalysis is a nondeterministic polynomial time-complete problem. Owing to the trend of stream ciphers based on nonlinear update, the success of algebraic attacks has ...
Asif Raza Kazmi   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy