期刊文献+
共找到9篇文章
< 1 >
每页显示 20 50 100
Cryptanalysis on a finite automaton public key cryptosystem
1
作者 戴大为 吴逵 张焕国 《Science China(Technological Sciences)》 SCIE EI CAS 1996年第1期27-36,共10页
An attack algorithm is proposed on a finite automaton public key cryptosystem.It is proved that this attack can break FAPKCO in polynomial time.The basic idea can be used in principle to attack other FAPKCs.Therefore,... An attack algorithm is proposed on a finite automaton public key cryptosystem.It is proved that this attack can break FAPKCO in polynomial time.The basic idea can be used in principle to attack other FAPKCs.Therefore,while designing an FAPKC,it must be taken into account whether it is secure or not under this kind of attack. 展开更多
关键词 finite autornaton public key cryptosystem cryptanalysis.
原文传递
Practical Cryptanalysis of a Public Key Cryptosystem Based on the Morphism of Polynomials Problem 被引量:1
2
作者 Jaihui Chen Chik How Tan Xiaoyu Li 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2018年第6期671-679,共9页
Multivariate Public Key Cryptography (MPKC) has intensively and rapidly developed during the past three decades. MPKC is a promising candidate for post-quantum cryptography. However, designing it is universally rega... Multivariate Public Key Cryptography (MPKC) has intensively and rapidly developed during the past three decades. MPKC is a promising candidate for post-quantum cryptography. However, designing it is universally regarded as a difficult task to design a secure MPKC foundation scheme, such as an encryption scheme and key exchange scheme. In this work, we investigate the security of a new public key cryptosystem that is based on the Morphism of Polynomials (MP). The public key cryptosystem proposed by Wang et al. (Wuhan University, China) comprises a key exchange scheme and encryption scheme. Its security can be provably reduced to the hardness of solving a new difficult problem, namely, the Decisional Multivariate Diffie Hellman (DMDH) problem. This problem Js a variant of the MP problem, which is difficult to solve by random systems. We present a proposition that reduces the DMDH problem to an easy example of the MP problem. Then, we propose an efficient algorithm for the Key Recover Attack (KRA) on the schemes of the public key cryptosystem. In practice, we are able to entirely break the cryptosystem's claimed parameter of 96 security levels in less than 17.252 s. Furthermore, we show that finding parameters that yield a secure and practical scheme is impossible. 展开更多
关键词 cryptanalysis post-quantum cryptography multivariate public key cryptosystems morphism ofpolynomials problem
原文传递
FAPKC3: A New Finite Automaton PublicKey Cryptosystem 被引量:1
3
作者 陶仁骥 陈世华 陈雪梅 《Journal of Computer Science & Technology》 SCIE EI CSCD 1997年第4期289-305,共17页
This paper deals with finite automaton public key cryptosystem and digital signatures. A new system FAPKC3 is proposed which can be used for encryption and implementing digital signatures as well. Some performances o... This paper deals with finite automaton public key cryptosystem and digital signatures. A new system FAPKC3 is proposed which can be used for encryption and implementing digital signatures as well. Some performances of a software implementation of FAPKC3 are presented and its security is discussed. 展开更多
关键词 finite automata public key cryptosystem.
原文传递
The generalization of public key cryptosystem FAPKC4
4
作者 Renji Tao Shihua Chen 《Chinese Science Bulletin》 SCIE EI CAS 1999年第9期784-790,共7页
FAPKC4, a public key cryptosystem based on automata theory, is generalized so that component automata of compound automata in user’s public key would not be restricted to memory finite automata. The generalized FAPKC... FAPKC4, a public key cryptosystem based on automata theory, is generalized so that component automata of compound automata in user’s public key would not be restricted to memory finite automata. The generalized FAPKCA can be used in encryption and implementing digital signatures as well. 展开更多
关键词 public key cryptosystem finite AUTOMATA invertibility.
原文传递
Probability method for cryptanalysis of general multivariate modular linear equation 被引量:3
5
作者 ZHOU HaiJian LUO Ping +1 位作者 WANG DaoShun DAI YiQi 《Science in China(Series F)》 2009年第10期1792-1800,共9页
Finding the solution to a general multivariate modular linear equation plays an important role in cryptanalysis field. Earlier results show that obtaining a relatively short solution is possible in polynomial time. Ho... Finding the solution to a general multivariate modular linear equation plays an important role in cryptanalysis field. Earlier results show that obtaining a relatively short solution is possible in polynomial time. However, one problem arises here that if the equation has a short solution in given bounded range, the results outputted by earlier algorithms are often not the ones we are interested in. In this paper, we present a probability method based on lattice basis reduction to solve the problem. For a general multivariate modular linear equation with short solution in the given bounded range, the new method outputs this short solution in polynomial time, with a high probability. When the number of unknowns is not too large (smaller than 68), the probability is approximating 1. Experimental results show that Knapsack systems and Lu-Lee type systems are easily broken in polynomial time with this new method. 展开更多
关键词 public key cryptosystems cryptanalysis lattice basis reduction multivariate modular linear equation
原文传递
有限自动机公开钥密码攻击算法AτM 被引量:2
6
作者 覃中平 张焕国 《计算机学报》 EI CSCD 北大核心 1995年第3期199-204,共6页
本文提出了一种对有限自动机公开钥密码体制进行已知密文攻击的算法AτM及其衍生算法AτM+.所提出的算法AτM或AτM+在某些情况下可能奏效.由此我们得到了一些关于有限自动机公开钥密码体制安全性的定量结果.
关键词 有限自动机 公开钥密码 算法 密码体制
下载PDF
FAPKC3的搜索攻击及非线性算子的新构造 被引量:2
7
作者 陈静 李扬渊 何大可 《计算机工程》 CAS CSCD 北大核心 2008年第2期111-113,共3页
针对FAPKC3的加密,在自动机方程的线性变换形式下分析了已知密文的随机搜索攻击,提出搜索算法RSS,对安全密钥的生成进行了相关讨论并给出了相应建议。鉴于传统的非线性RaRb方法较为复杂,以及通常选用的"向量与"形式的非线性... 针对FAPKC3的加密,在自动机方程的线性变换形式下分析了已知密文的随机搜索攻击,提出搜索算法RSS,对安全密钥的生成进行了相关讨论并给出了相应建议。鉴于传统的非线性RaRb方法较为复杂,以及通常选用的"向量与"形式的非线性算子的缺陷,基于一种更为简单的"上三角矩阵法"提出了非线性算子的新构造。 展开更多
关键词 有限自动机公钥密码 密码分析 随机搜索 上三角矩阵法
下载PDF
密码攻击ALT~+算法 被引量:1
8
作者 覃中平 张焕国 《计算机学报》 EI CSCD 北大核心 1997年第6期546-550,共5页
本文提出密码攻击ALT~+算法,它可成功地对有限自动机公开钥密码的FAPKC_0方案的加密与签名功能进行攻击且算法的结构比密码攻击A算法简洁.
关键词 公开钥密码 密码分析 有限自动机 ALT^+算法
下载PDF
Constructing Finite Automata with Invertibility bytransformation Method 被引量:2
9
作者 陶仁骥 陈世华 《Journal of Computer Science & Technology》 SCIE EI CSCD 2000年第1期10-26,共17页
Ra, Rb transformations were successfully applied to establish invertibility theory for linear and quasi-linear finite automata over finite fields. In aprevious paper, the authors generalized R., Rb transformations to ... Ra, Rb transformations were successfully applied to establish invertibility theory for linear and quasi-linear finite automata over finite fields. In aprevious paper, the authors generalized R., Rb transformations to deal with nonlinear memory finite automata, and gave sufficient conditions for weak inverse andfor weakly invertible memory finite automata and inversion processes concerned;methods by transformation to generate a kind of nonlinear memory finite automatasatisfying one of these sufficient conditions were also given. This paper extends theconcepts, methods and results to general finite automata, in which states consist offinite input history, finite output history and finite 'inner state' history. 展开更多
关键词 finite automata INVERTIBILITY public key cryptosystem
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部