期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
On the Equivalent Keys in Multivariate Cryptosystems
1
作者 刘明洁 韩立东 王小云 《Tsinghua Science and Technology》 SCIE EI CAS 2011年第3期225-232,共8页
The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes. The result gives the lower... The number of equivalent keys in multivariate cryptosystem is closely related to the scheme security. This study analyzes the structure of the private key space in some multivariate schemes. The result gives the lower bounds on the number of equivalent keys of some variants of the hidden field equation (HFE) scheme including plus, minus-plus, embedding, and internal perturbation. This method estimates the number of invertible transformations which maintain the form of the central map invariant. Furthermore,a formal proof shows that the two modifications of fixing and embedding are equivalent in security analyses of multivariate schemes. Also this paper corrects previous proofs in Wolf’s work on the number of equivalent keys in HFEv,the unbalanced oil and vinegar (UOV) scheme, and the stepwise triangular systems (STS). 展开更多
关键词 multivariate cryptosystem equivalent keys hidden field equation (HFE) modified techniques
原文传递
Cryptanalysis on an image block encryption algorithm based on spatiotemporal chaos 被引量:1
2
作者 王兴元 何国祥 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期77-83,共7页
An image block encryption scheme based on spatiotemporal chaos has been proposed recently. In this paper, we analyse the security weakness of the proposal. The main problem of the original scheme is that the generated... An image block encryption scheme based on spatiotemporal chaos has been proposed recently. In this paper, we analyse the security weakness of the proposal. The main problem of the original scheme is that the generated keystream remains unchanged for encrypting every image. Based on the flaws, we demonstrate a chosen plaintext attack for revealing the equivalent keys with only 6 pairs of plaintext/ciphertext used. Finally, experimental results show the validity of our attack. 展开更多
关键词 ENCRYPTION spatiotemporal chaos chosen plaintext attack equivalent keys
下载PDF
CRYPTANALYSIS OF AN EXTENDED MQ SIGNATURE SYSTEM HTTM
3
作者 Jing Zhengjun Yu Zhimin +2 位作者 Gu Chunsheng Wu Fangsheng Zhao Xiaorong 《Journal of Electronics(China)》 2013年第5期491-499,共9页
Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.pro... Since Multivatriate Quadratic(MQ)-based Public Key Cryptosystem(MPKC)has been one of the hot research fields of post-quantum cryptography,it becomes important to analyze the security of new MPKC schemes.Wang et al.proposed a novel multivariate signature scheme with Hash-based Tame Transformation and Minus(HTTM)in 2011.For this extended MQ-based signature,we can transform it into an SFLASH variant by splitting and merging HT transformation,and solve an equivalent private key corresponding to the public key of HTTM.Thus,the adversary can forge legitimate signature for any message by using this equivalent private key. 展开更多
关键词 Multivariate Quadratic(MQ) problem CRYPTANALYSIS equivalent private key Forging signature Hash-based Tame Transformation and Minus(HTTM
下载PDF
A New Feistel-Type White-Box Encryption Scheme 被引量:4
4
作者 Ting-Ting Lin Xue-Jia Lai +1 位作者 Wei-Jia Xue Yin Jia 《Journal of Computer Science & Technology》 SCIE EI CSCD 2017年第2期386-395,共10页
The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almo... The white-box attack is a new attack context in which it is assumed that cryptographic software is implemented on an un-trusted platform and all the implementation details are controlled by the attackers. So far, almost all white-box solutions have been broken. In this study, we propose a white-box encryption scheme that is not a variant of obfuscating existing ciphers but a completely new solution. The new scheme is based on the unbalanced Feistel network as well as the ASASASA (where "A" means affine, and "S" means substitution) structure. It has an optional input block size and is suitable for saving space compared with other solutions because the space requirement grows slowly (linearly) with the growth of block size. Moreover, our scheme not only has huge white-box diversity and white-box ambiguity but also has a particular construction to bypass public white-box cryptanalysis techniques, including attacks aimed at white-box variants of existing ciphers and attacks specific to the ASASASA structure. More precisely, we present a definition of white-box security with regard to equivalent key, and prove that our scheme satisfies such security requirement. 展开更多
关键词 WHITE-BOX equivalent key Feistel network CRYPTOGRAPHY ASASASA
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部