2021 International Conference on Information Science and Communications Technologies (ICISCT) 2021
DOI: 10.1109/icisct52966.2021.9670359
|View full text |Cite
|
Sign up to set email alerts
|

Application of the algebraic cryptanalysis method to the Kuznyechik encryption algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 5 publications
0
1
0
Order By: Relevance
“…Multiplication by an invertible diamatrix yields a diamatrix comprising multiple non-zero elements. These resultant values emerge from multiplication either by d 7 , an odd number, or by the residual sum from one of the terms in (4). Given that d 7 is odd and the entire term must be odd, the residual sum therein must be even.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Multiplication by an invertible diamatrix yields a diamatrix comprising multiple non-zero elements. These resultant values emerge from multiplication either by d 7 , an odd number, or by the residual sum from one of the terms in (4). Given that d 7 is odd and the entire term must be odd, the residual sum therein must be even.…”
Section: Resultsmentioning
confidence: 99%
“…Abdurakhimov et al [4] analyzed algebraic attack on this algorithm in theory. They estimated the complexity of attack at 2 73 operations.…”
Section: Introductionmentioning
confidence: 99%
“…Natural Language Processing (NLP) [39], which mainly manipulates human language, has been applied in many tasks, such as in language translation and Chatbots. It can also be utilized in cryptanalysis [11,[40][41][42][43][44][45][46][47][48][49][50] to investigate the vulnerability of cryptographic algorithms used for text encryption. In [41], they recovered keys with a deep learning model from the ciphertexts encrypted with classical cryptographic algorithms, Caesar, Vigenère, and substitution cipher.…”
Section: Deep Learning-based Cryptanalysis On Text Datamentioning
confidence: 99%
“…The model with skip connection [24] was used for key prediction. In [48], they analyzed SM4 by recovering keys with MLPbased deep learning models, and the plaintexts, ciphertexts, and the keys used in the paper were generated by using a random number generator. In [49], they used an RNNbased deep learning model [51] to generate ciphertexts and recover plaintexts in small-PRESENT.…”
Section: Deep Learning-based Cryptanalysis On Text Datamentioning
confidence: 99%
“…Additionally, the integral cryptanalysis schemes have since been applied to various ciphers, including Hierocrypt [12], IDEA [13], Camellia [14], MISTY [15], and FOX [16] (now called IDEA NXT). In addition, an algebric cryptoanalysis method is also popular in cryptography and security as described in [5,17].…”
Section: Integral Cryptanalysis-based Encryptionmentioning
confidence: 99%