Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
نویسندگان
چکیده
The asymmetric cipher protocol, based on decomposition problem in matrix semiring M over semiring of natural numbers N is presented. The security of presented cipher protocol is based on matrix decomposition problem (MDP), which is linked to the problem of solution of multivariate polynomial system of equations. Compromitation of proposed scheme relies on the solution of system of multivariate polynomial system of equations over the semiring of natural numbers N . The security parameters are defined, security analysis and implementation is presented.
منابع مشابه
Post-Quantum Cryptography(PQC): Generalized ElGamal Cipher over GF(251^8)
Shor's polynomial time algorithm for numerical field problems like integer factorization (IFP) or the discrete logarithm (DLP). Other aspects are the backdoors discovered in deterministic random generators or recent advances in solving some instances of DLP. The use of alternative algebraic structures like non-commutative or non-associative partial groupoids, magmas, monoids, semigroups, quasig...
متن کاملNew Asymmetric Cipher of Non-Commuting Cryptography Class Based on Matrix Power Function
Abstract. New asymmetric cipher based on matrix power function is presented. Cipher belongs to the class of recently intensively evolving non-commuting cryptography due to expectation of its resistance to potential quantum cryptanalysis. The algebraic structures for proposed cipher construction are defined. Security analysis was performed and security parameters are defined. On the base of this...
متن کاملBiometric Authentication of Fingerprint for Banking Users, Using Stream Cipher Algorithm
Providing banking services, especially online banking and electronic payment systems, has always been associated with high concerns about security risks. In this paper, customer authentication for their transactions in electronic banking has been discussed, and a more appropriate way of using biometric fingerprint data, as well as encrypting those data in a different way, has been suggest...
متن کاملNovel Impossible Differential Cryptanalysis of Zorro Block Cipher
Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...
متن کاملA Noval Security Mechanism for Image Authentication and Copyright Protection
Encryption and watermarking are two primary and complementary technologies for protecting multimedia content. In this paper, we present a hybrid image protection scheme to establish a robust content-based authentication by using novel cryptosystem based on matrix transformation for generation of encryption key and copyright protection by using SVD based watermarking system. This paper suggests ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Informatica, Lith. Acad. Sci.
دوره 21 شماره
صفحات -
تاریخ انتشار 2010