Results 51 to 60 of about 284 (159)
A new method to solve MRHS equation systems and its connection to group factorization
Multiple right-hand side (MRHS) equations over finite fields are a relatively new tool useful for algebraic cryptanalysis. The main advantage is in an efficient representation of the cryptographic primitives.
Zajac Pavol
doaj +1 more source
Post‐Quantum Digital Signatures for Enhanced Medical Image Security
This study explores the use of Sphincs+, Dilithium, and Falcon to enhance the security of medical images against quantum threats. By leveraging digital signatures for authentication and integrity verification, the proposed approach mitigates risks of tampering and ensures the reliability of healthcare records.
Kumar Sekhar Roy +5 more
wiley +1 more source
Cryptanalysis of Algebraic Verifiable Delay Functions
Verifiable Delay Functions (VDF) are a class of cryptographic primitives aiming to guarantee a minimum computation time, even for an adversary with massive parallel computational power. They are useful in blockchain protocols, and several practical candidates have been proposed based on exponentiation in a large finite field: Sloth++, Veedo, MinRoot ...
Biryukov, Alex +6 more
openaire +1 more source
Algebraic Cryptanalysis of 58-Round SHA-1 [PDF]
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article is to sophisticate and improve Wang’s attack by using algebraic techniques. We introduce new notions, namely semi-neutral bit and adjuster and propose then an improved message modification technique based on algebraic techniques.
Sugita, Makoto +3 more
openaire +1 more source
Tamper Localisation Using Quantum Fourier Transform Signatures for Medical Image Authentication
We present a tamper‐localisation framework that embeds authentication signatures as phase‐only perturbations in blockwise QFT coefficients using keyed sparse mid‐band supports and light cross‐block coupling, preserving magnitudes (energy) and imperceptibility.
Kumar Sekhar Roy +4 more
wiley +1 more source
Algebraic Cryptanalysis of Ascon Using MRHS Equations
Abstract Ascon is a family of lightweight authenticated encryption and hashing algorithms, which is a finalist in the NIST Lightweight Cryptography competition. We study the Ascon algorithm from the perspective of algebraic cryptanalysis based on the MRHS representation of the cipher. We call such an approach an MRHS cryptanalysis.
Smičík, Miloslav, Zajac, Pavol
openaire +2 more sources
A Novel Method of Data Protection Through DNA Chromosome Databases
With the advancement of the digital age, data have become insecure, which requires techniques to secure data. Deoxyribonucleic acid (DNA) has become an increasingly secure technology for storing next‐generation digital data. DNA provides superior capabilities due to its high and efficient storage capacity and long lifespan.
Sadoon Hussein +2 more
wiley +1 more source
Complexity Engineering: How Subjective Issues Become Objective
This study details the substantial technological progress experienced in the last few decades, its impact on engineering, and how machine learning along with data science can contribute to solving human problems. The objective here is to establish the principles of “complexity engineering,” based on the works of Edgar Morin, and to demonstrate how ...
José Roberto C. Piqueira +3 more
wiley +1 more source
Improvement and evaluation for algebraic fault attacks on PRESENT
An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving ...
Jing HUANG +6 more
doaj +2 more sources
The Cryptanalysis Of The Enigma Cipher. The Plugboard And The Cryptologic Bomb.
We study the problem of decoding secret messages encrypted by the German Army with the M3 Enigma machine after September 15, 1938. We focused our attention on the algorithmization and programming of this problem. A completion and optimization of Zygalski’
Anna Borowska, Elzbieta Rzeszutko
doaj +1 more source

