2016
DOI: 10.1515/eng-2016-0034
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of an encryption scheme based on nonpositional polynomial notations

Abstract: Abstract:The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (RNSs) based on irreducible polynomials over GF(2). To evaluate if the algorithms developed on the basis of NPNs are secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been designed. The cryptanalysis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 17 publications
0
10
0
Order By: Relevance
“…For multiplication in an NPN, a partial attack was used. Earlier studies had been conducted in this direction [27]. The system of equations binding the key, plaintext, and ciphertext in the encryption scheme based on an NPN for one irreducible polynomial is given below: In this context, the input data are random sequences resulting from other transformations.…”
Section: Algebraic Analysis Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…For multiplication in an NPN, a partial attack was used. Earlier studies had been conducted in this direction [27]. The system of equations binding the key, plaintext, and ciphertext in the encryption scheme based on an NPN for one irreducible polynomial is given below: In this context, the input data are random sequences resulting from other transformations.…”
Section: Algebraic Analysis Resultsmentioning
confidence: 99%
“…In the case of an algebraic attack, provided that the ciphertext and plaintext are known, the number of search operations for finding the key lies within the following interval [27]:…”
Section: Algebraic Analysis Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In comparison of the classical system, the proposed cryptographic procedures are considered in the residual classes of the number system, where prime numbers are taken as a basis. In the encryption algorithm, the key sequence and prime numbers are taken as the full key, and as the basis of the system, all prime numbers not exceeding the length of the encrypted message from the selected bases in the order of distribution are selected [27,28].…”
Section: Methodsmentioning
confidence: 99%
“…In [14][15][16][17] described approaches to the development of a block symmetric encryption algorithm based on polynomial RNS, where secrecy is determined by the so-called "full key", which consists of a secret key (pseudo-random) sequence and the selected moduli system. Resistance against exhaustive search in this case depends not only on the length of the secret sequence but also on the composition of selected system of polynomial bases, and on the number of possible permutations of bases in that system [18].…”
mentioning
confidence: 99%