Complexity of The Systems of Linear Restrictions over a Finite Field

Oleh Kurinnyi
{"title":"Complexity of The Systems of Linear Restrictions over a Finite Field","authors":"Oleh Kurinnyi","doi":"10.20535/tacs.2664-29132023.2.280676","DOIUrl":null,"url":null,"abstract":"This paper continues the results obtained in [1]. In the previous paper, we formulated the problem of the unknown vector recovering from linear dependencies with this vector, which act as constraints on it. The next step, after finding out some algebraic and combinatorial properties, is to give basic estimates of complexity for the main problem as well as for related problems. Such related problems can be obtained by fixing some parameters of the main problem or applying constraints on the number of restrictions in the system. Such an analysis makes possible to arrange the problem of recovering an unknown vector based on partial information into the general computational complexity framework in order to approach existing theoretical results to its solution. The obtained theoretical results can be used in algebraic cryptanalysis of stream ciphers and cryptosystems based on linear codes.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"111 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical and applied cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20535/tacs.2664-29132023.2.280676","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This paper continues the results obtained in [1]. In the previous paper, we formulated the problem of the unknown vector recovering from linear dependencies with this vector, which act as constraints on it. The next step, after finding out some algebraic and combinatorial properties, is to give basic estimates of complexity for the main problem as well as for related problems. Such related problems can be obtained by fixing some parameters of the main problem or applying constraints on the number of restrictions in the system. Such an analysis makes possible to arrange the problem of recovering an unknown vector based on partial information into the general computational complexity framework in order to approach existing theoretical results to its solution. The obtained theoretical results can be used in algebraic cryptanalysis of stream ciphers and cryptosystems based on linear codes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
有限域上线性限制系统的复杂性
本文延续了文献[1]的结果。在上一篇文章中,我们提出了未知向量从与该向量的线性依赖中恢复的问题,该向量作为对其的约束。在找出一些代数和组合性质之后,下一步是对主要问题以及相关问题的复杂性进行基本估计。这种相关问题可以通过固定主要问题的某些参数或在系统中施加约束的数量来获得。这样的分析可以将基于部分信息的未知向量恢复问题安排到一般的计算复杂度框架中,从而使现有的理论结果接近于其解。所得理论结果可用于流密码和基于线性码的密码系统的代数密码分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Malware detection system based on static and dynamic analysis and using machine learning Cryptanalysis of the «Vershyna» digital signature algorithm The Development of the Solution Search Method Based on the Improved Bee Colony Algorithm Complexity of The Systems of Linear Restrictions over a Finite Field Vulnerability classification using Q-analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1