Skip to main content

Showing 1–7 of 7 results for author: Tiwari, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.09950  [pdf, ps, other

    cs.CR cs.SC math.AC

    Oracle-Based Multistep Strategy for Solving Polynomial Systems Over Finite Fields and Algebraic Cryptanalysis of the Aradi Cipher

    Authors: La Scala Roberto, Sharwan Kumar Tiwari

    Abstract: The multistep solving strategy consists in a divide-and-conquer approach: when a multivariate polynomial system is computationally infeasible to solve directly, one variable is assigned over the elements of the base finite field, and the procedure is recursively applied to the resulting simplified systems. In a previous work by the same authors (among others), this approach proved effective in the… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

    Comments: 19 pages

  2. arXiv:2304.07820  [pdf, ps, other

    cs.SC cs.CR math.AC

    A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium

    Authors: Roberto La Scala, Federico Pintore, Sharwan K. Tiwari, Andrea Visconti

    Abstract: In this paper we introduce a multistep generalization of the guess-and-determine or hybrid strategy for solving a system of multivariate polynomial equations over a finite field. In particular, we propose performing the exhaustive evaluation of a subset of variables stepwise, that is, by incrementing the size of such subset each time that an evaluation leads to a polynomial system which is possibl… ▽ More

    Submitted 5 June, 2024; v1 submitted 16 April, 2023; originally announced April 2023.

    Comments: 29 pages. To appear in Finite Fields and Their Applications

  3. arXiv:2201.01262  [pdf, other

    cs.CR cs.SC math.AC math.RA

    An algebraic attack to the Bluetooth stream cipher E0

    Authors: Roberto La Scala, Sergio Polese, Sharwan K. Tiwari, Andrea Visconti

    Abstract: In this paper we study the security of the Bluetooth stream cipher E0 from the viewpoint it is a "difference stream cipher", that is, it is defined by a system of explicit difference equations over the finite field GF(2). This approach highlights some issues of the Bluetooth encryption such as the invertibility of its state transition map, a special set of 14 bits of its 132-bit state which when g… ▽ More

    Submitted 8 August, 2022; v1 submitted 4 January, 2022; originally announced January 2022.

    Comments: 24 pages, 1 figure. To appear in Finite Fields and Their Applications

    MSC Class: 11T71 (Primary) 12H10; 13P10 (Secondary)

  4. arXiv:2112.07411  [pdf, ps, other

    cs.CR cs.IT

    INRU: A Quasigroup Based Lightweight Block Cipher

    Authors: Sharwan K. Tiwari, Ambrish Awasthi, Sucheta Chkrabarti, Sudha Yadav

    Abstract: In this paper, we propose a quasigroup based block cipher design. The round functions of the encryption and decryption algorithms use quasigroup based string transformations. We show the robustness of the design against the standard differential, linear and algebraic cryptanalytic attacks. We also provide detailed statistical analysis using NIST test suite in CBC, CFB, OFB, and CTR modes of operat… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

  5. arXiv:2112.05516  [pdf, ps, other

    math.CO cs.IT math.GR

    Algebraic Properties of Subquasigroups and Construction of Cryptographically Suitable Finite Quasigroups

    Authors: V. A. Artamonov, Sucheta Chakrabarti, Sharwan K. Tiwari, V. T. Markov

    Abstract: In this paper, we identify many important properties and develop criteria for the existence of subquasigroups in finite quasigroups. Based on these results, we propose an effective method that concludes the nonexistence of subquasigroup of a finite quasigroup, otherwise finds its all possible proper subquasigroups. This has an important application in checking the cryptographic suitability of a fi… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  6. arXiv:2003.14215  [pdf, ps, other

    cs.CR cs.SC math.AC math.RA

    Stream/block ciphers, difference equations and algebraic attacks

    Authors: Roberto La Scala, Sharwan K. Tiwari

    Abstract: In this paper we model a class of stream and block ciphers as systems of (ordinary) explicit difference equations over a finite field. We call this class "difference ciphers" and we show that ciphers of application interest, as for example systems of LFSRs with a combiner, Trivium and Keeloq, belong to the class. By using Difference Algebra, that is, the formal theory of difference equations, we c… ▽ More

    Submitted 23 August, 2021; v1 submitted 28 March, 2020; originally announced March 2020.

    Comments: 26 pages, to appear in Journal of Symbolic Computation

  7. arXiv:1704.02852  [pdf, ps, other

    math.RA cs.SC

    Modular Techniques For Noncommutative Gröbner Bases

    Authors: Wolfram Decker, Christian Eder, Viktor Levandovskyy, Sharwan K. Tiwari

    Abstract: In this note, we extend modular techniques for computing Gröbner bases from the commutative setting to the vast class of noncommutative $G$-algebras. As in the commutative case, an effective verification test is only known to us in the graded case. In the general case, our algorithm is probabilistic in the sense that the resulting Gröbner basis can only be expected to generate the given ideal, wit… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.