Skip to main content

Showing 1–9 of 9 results for author: Courtois, N T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2109.01047  [pdf, ps, other

    cs.CR cs.CY cs.DC

    Crypto Currency Regulation and Law Enforcement Perspectives

    Authors: Nicolas T. Courtois, Kacper T. Gradon, Klaus Schmeh

    Abstract: This paper provides an overview of how crypto currency and blockchain engineering interacts with the law enforcement. We point out that a large proportion of crypto users are amateur investors and the dominant and the largest segment in crypto crime are simply investment scams (!). We look at various questions of criminal use and misuse of technology, especially in the areas of money laundering or… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: 38 pages, 0 figures

    ACM Class: K.4; K.5; C.3

  2. arXiv:2002.03212  [pdf, other

    cs.CR math.AC

    Invariant Hopping Attacks on Block Ciphers

    Authors: Nicolas T. Courtois

    Abstract: Block ciphers are in widespread use since the 1970s. Their iterated structure is prone to numerous round invariant attacks for example in Linear Cryptanalysis (LC). The next step is to look at non-linear polynomial invariants cf. Eurocrypt'95. Until recently, researchers have found extremely few such attacks, with some impossibility results. Eventually recent papers show how to construct polynomia… ▽ More

    Submitted 8 February, 2020; originally announced February 2020.

    Comments: 27 pages, 8 figures, extended version with new more complex examples of attacks

    MSC Class: 13A50; 68P25 (Primary) 94A60; 14G50 (Secondary) ACM Class: E.3; G.2.3

  3. arXiv:1905.04684  [pdf, ps, other

    cs.CR

    Lack of Unique Factorization as a Tool in Block Cipher Cryptanalysis

    Authors: Nicolas T. Courtois, Aidan Patrick

    Abstract: Linear (or differential) cryptanalysis may seem dull topics for a mathematician: they are about super simple invariants characterized by say a word on n=64 bits with very few bits at 1, the space of possible attacks is small, and basic principles are trivial. In contract mathematics offers an infinitely rich world of possibilities. If so, why is that cryptographers have ever found so few attacks o… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    MSC Class: 13A50; 94A60; 68P25; 11T71; 14G50 ACM Class: E.3; I.1; K.2

  4. arXiv:1902.02748  [pdf, other

    cs.CR math.AG math.CO math.GR math.RA

    Constructive Non-Linear Polynomial Cryptanalysis of a Historical Block Cipher

    Authors: Nicolas T. Courtois, Marios Georgiou

    Abstract: One of the major open problems in symmetric cryptanalysis is to discover new specif i c types of invariant properties which can hold for a larger number of rounds of a block cipher. We have Generalised Linear Cryptanalysis (GLC) and Partitioning Cryptanalysis (PC). Due to double-exponential combinatorial explosion of the number of possible invariant properties systematic exploration is not possibl… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

    Comments: Nearly identical to paper submitted to Eurocrypt 2019 in October 2018

    MSC Class: 94A60; 68P25; 11T71; 14G50 ACM Class: E.3; I.1; K.2

  5. arXiv:1902.02609  [pdf, other

    cs.CR

    Distributed Ledger Privacy: Ring Signatures, Möbius and CryptoNote

    Authors: Christopher D. Clack, Nicolas T. Courtois

    Abstract: Distributed ledger and blockchain systems are expected to make financial systems easier to audit, reduce counter-party risk and transfer assets seamlessly. The key concept is a token controlled by a cryptographic private key for spending, and represented by a public key for receiving and audit purposes. Ownership transfers are authorized with digital signatures and recorded on a ledger visible to… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

    Comments: 47 pages

    MSC Class: 94A60; 14G50 ACM Class: K.4.4; D.4.6; E.3; K.6.5; D.2.4

  6. arXiv:1405.0534  [pdf, other

    cs.CR cs.CE

    On The Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies

    Authors: Nicolas T. Courtois

    Abstract: In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin crypto currency and its numerous clones. In particular we look at The Longest Chain Rule, the monetary supply policies and the exact mechanisms which implement them. We claim that these built-in properties are not as brilliant as they are sometimes claimed. A closer examination reveals that they are closer to bei… ▽ More

    Submitted 10 December, 2014; v1 submitted 2 May, 2014; originally announced May 2014.

    Comments: 89 pages, work in progress, the author's blog is blog.bettercrypto.com

    ACM Class: D.4.6; K.4.1; K.4.4

  7. arXiv:1402.1718  [pdf, other

    cs.CR cs.CE cs.SI

    On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency

    Authors: Nicolas T. Courtois, Lear Bahack

    Abstract: Bitcoin is a "crypto currency", a decentralized electronic payment scheme based on cryptography. Bitcoin economy grows at an incredibly fast rate and is now worth some 10 billions of dollars. Bitcoin mining is an activity which consists of creating (minting) the new coins which are later put into circulation. Miners spend electricity on solving cryptographic puzzles and they are also gatekeepers w… ▽ More

    Submitted 2 December, 2014; v1 submitted 28 January, 2014; originally announced February 2014.

    Comments: not published elsewhere

    ACM Class: D.4.6; K.4.1; K.4.4

  8. arXiv:1310.7935  [pdf, other

    cs.CR cs.CE cs.SI

    The Unreasonable Fundamental Incertitudes Behind Bitcoin Mining

    Authors: Nicolas T. Courtois, Marek Grajek, Rahul Naik

    Abstract: Bitcoin is a "crypto currency", a decentralized electronic payment scheme based on cryptography which has recently gained excessive popularity. Scientific research on bitcoin is less abundant. A paper at Financial Cryptography 2012 conference explains that it is a system which "uses no fancy cryptography", and is "by no means perfect". It depends on a well-known cryptographic standard SHA-256. In… ▽ More

    Submitted 10 April, 2014; v1 submitted 29 October, 2013; originally announced October 2013.

    Comments: 45 pages, colour figures in jpg, not published elsewhere than arxiv

    ACM Class: E.3; D.4.6; K.4.1; K.4.4

  9. arXiv:1108.2830  [pdf, ps, other

    cs.SC cs.CC math.NA math.RT

    A New General-Purpose Method to Multiply 3x3 Matrices Using Only 23 Multiplications

    Authors: Nicolas T. Courtois, Gregory V. Bard, Daniel Hulme

    Abstract: One of the most famous conjectures in computer algebra is that matrix multiplication might be feasible in not much more than quadratic time. The best known exponent is 2.376, due to Coppersmith and Winograd. Many attempts to solve this problems in the literature work by solving, fixed-size problems and then apply the solution recursively. This leads to pure combinatorial optimisation problems with… ▽ More

    Submitted 19 August, 2011; v1 submitted 13 August, 2011; originally announced August 2011.

    Comments: This work was supported by the UK Technology Strategy Board under Project No: 9626-58525

    MSC Class: 65F05 ACM Class: G.1.3; F.2.1; I.1.2