-
arXiv:1006.5894 [pdf, ps, other]
A possible intrinsic weakness of AES and other cryptosystems
Abstract: It has been suggested that the algebraic structure of AES (and other similar block ciphers) could lead to a weakness exploitable in new attacks. In this paper, we use the algebraic structure of AES-like ciphers to construct a cipher embedding where the ciphers may lose their non-linearity. We show some examples and we discuss the limitations of our approach.
Submitted 11 November, 2010; v1 submitted 30 June, 2010; originally announced June 2010.
Comments: 46 pages- updated bibliography and fixed minor problems
-
arXiv:0909.2694 [pdf, ps, other]
Singularity of Sparse Circulant Matrices is NP-complete
Abstract: It is shown by Karp reduction that deciding the singularity of $(2^n - 1) \times (2^n - 1)$ sparse circulant matrices (SC problem) is NP-complete. We can write them only implicitly, by indicating values of the $2 + n(n + 1)/2$ eventually nonzero entries of the first row and can make all matrix operations with them. The positions are $0, 1, 2^{i} + 2^{j}$. The complexity parameter is $n$. Mulmule… ▽ More
Submitted 14 September, 2009; originally announced September 2009.
Comments: References are somewhere in the middle, before the appendices. 8 pages
-
arXiv:cs/0305034 [pdf, ps, other]
Cryptanalysis of HFE
Abstract: I transform the trapdoor problem of HFE into a linear algebra problem.
Submitted 26 June, 2003; v1 submitted 17 May, 2003; originally announced May 2003.
Comments: 7 pages. Minor changes expected
ACM Class: E.3
-
arXiv:cs/0304013 [pdf, ps, other]
Hidden Polynomial(s) Cryptosystems
Abstract: We propose public-key cryptosystems with public key a system of polynomial equations, algebraic or differential, and private key a single polynomial or a small-size ideal. We set up probabilistic encryption, signature, and signcryption protocols.
Submitted 9 April, 2003; originally announced April 2003.
ACM Class: E.3
-
arXiv:cs/0302037 [pdf, ps, other]
Hidden Polynomial(s) Cryptosystems
Abstract: We propose variations of the class of hidden monomial cryptosystems in order to make it resistant to all known attacks. We use identities built upon a single bivariate polynomial equation with coefficients in a finite field. Indeed, it can be replaced by a ``small'' ideal, as well. Throughout, we set up probabilistic encryption protocols, too. The same ideas extend to digital signature algorithm… ▽ More
Submitted 29 March, 2003; v1 submitted 26 February, 2003; originally announced February 2003.
Comments: 17 pages
ACM Class: E.3