首页 > 最新文献

Cryptography最新文献

英文 中文
A New Idea for RSA Backdoors RSA后门的一种新思路
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-21 DOI: 10.3390/cryptography7030045
Marco Cesati
This article proposes a new method to inject backdoors in RSA (the public-key cryptosystem invented by Rivest, Shamir, and Adleman) and other cryptographic primitives based on the integer factorization problem for balanced semi-primes. The method relies on mathematical congruences among the factors of the semi-primes based on a large prime number, which acts as a “designer key” or “escrow key”. In particular, two different backdoors are proposed, one targeting a single semi-prime and the other one a pair of semi-primes. This article also describes the results of tests performed on a SageMath implementation of the backdoors.
本文基于平衡半素数的整数分解问题,提出了一种在RSA(由Rivest、Shamir和Adleman发明的公钥密码系统)和其他密码原语中注入后门的新方法。该方法依赖于基于一个大素数的半素数因子之间的数学同余,该大素数充当“设计密钥”或“托管密钥”。特别地,提出了两种不同的后门,一种针对单个半素数,另一种针对一对半素数。本文还描述了在后门的SageMath实现上执行的测试结果。
{"title":"A New Idea for RSA Backdoors","authors":"Marco Cesati","doi":"10.3390/cryptography7030045","DOIUrl":"https://doi.org/10.3390/cryptography7030045","url":null,"abstract":"This article proposes a new method to inject backdoors in RSA (the public-key cryptosystem invented by Rivest, Shamir, and Adleman) and other cryptographic primitives based on the integer factorization problem for balanced semi-primes. The method relies on mathematical congruences among the factors of the semi-primes based on a large prime number, which acts as a “designer key” or “escrow key”. In particular, two different backdoors are proposed, one targeting a single semi-prime and the other one a pair of semi-primes. This article also describes the results of tests performed on a SageMath implementation of the backdoors.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136237690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem 一种新颖安全的假模Rabin-Ӡ密码系统
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-19 DOI: 10.3390/cryptography7030044
Raghunandan Kemmannu Ramesh, Radhakrishna Dodmane, Surendra Shetty, Ganesh Aithal, Monalisa Sahu, Aditya Kumar Sahu
Electronic commerce (E-commerce) transactions require secure communication to protect sensitive information such as credit card numbers, personal identification, and financial data from unauthorized access and fraud. Encryption using public key cryptography is essential to ensure secure electronic commerce transactions. RSA and Rabin cryptosystem algorithms are widely used public key cryptography techniques, and their security is based on the assumption that it is computationally infeasible to factorize the product of two large prime numbers into its constituent primes. However, existing variants of RSA and Rabin cryptosystems suffer from issues like high computational complexity, low speed, and vulnerability to factorization attacks. To overcome the issue, this article proposes a new method that introduces the concept of fake-modulus during encryption. The proposed method aims to increase the security of the Rabin cryptosystem by introducing a fake-modulus during encryption, which is used to confuse attackers who attempt to factorize the public key. The fake-modulus is added to the original modulus during encryption, and the attacker is unable to distinguish between the two. As a result, the attacker is unable to factorize the public key and cannot access the sensitive information transmitted during electronic commerce transactions. The proposed method’s performance is evaluated using qualitative and quantitative measures. Qualitative measures such as visual analysis and histogram analysis are used to evaluate the proposed system’s quality. To quantify the performance of the proposed method, the entropy of a number of occurrences for the pixels of cipher text and differential analysis of plaintext and cipher text is used. When the proposed method’s complexity is compared to a recent variant of the Rabin cryptosystem, it can be seen that it is more complex to break the proposed method—represented as O(ɲ× τ) which is higher than Rabin-P (O(ɲ)) algorithms.
电子商务(电子商务)交易需要安全通信,以保护敏感信息,如信用卡号、个人身份和财务数据,使其免遭未经授权的访问和欺诈。使用公钥加密技术进行加密对于确保电子商务交易的安全性至关重要。RSA和Rabin密码系统算法是广泛使用的公钥加密技术,它们的安全性是基于这样一个假设:将两个大素数的乘积分解成它的组成素数在计算上是不可行的。然而,RSA和Rabin密码系统的现有变体存在诸如高计算复杂度、低速度和易受因数分解攻击等问题。为了克服这个问题,本文提出了一种新的方法,在加密过程中引入假模的概念。提出的方法旨在通过在加密过程中引入假模量来提高Rabin密码系统的安全性,该假模量用于迷惑试图分解公钥的攻击者。在加密过程中,假模量被添加到原始模量中,攻击者无法区分两者。因此,攻击者无法对公钥进行分解,也无法访问电子商务交易过程中传输的敏感信息。采用定性和定量方法对该方法的性能进行了评价。定性措施,如视觉分析和直方图分析被用来评估所提出的系统的质量。为了量化所提出的方法的性能,使用了密文像素的出现次数熵和明文和密文的差分分析。当所提出的方法的复杂度与最近的Rabin密码系统的变体进行比较时,可以看出,所提出的方法(表示为O(ν × τ))比Rabin- p (O(ν))算法更复杂。
{"title":"A Novel and Secure Fake-Modulus Based Rabin-Ӡ Cryptosystem","authors":"Raghunandan Kemmannu Ramesh, Radhakrishna Dodmane, Surendra Shetty, Ganesh Aithal, Monalisa Sahu, Aditya Kumar Sahu","doi":"10.3390/cryptography7030044","DOIUrl":"https://doi.org/10.3390/cryptography7030044","url":null,"abstract":"Electronic commerce (E-commerce) transactions require secure communication to protect sensitive information such as credit card numbers, personal identification, and financial data from unauthorized access and fraud. Encryption using public key cryptography is essential to ensure secure electronic commerce transactions. RSA and Rabin cryptosystem algorithms are widely used public key cryptography techniques, and their security is based on the assumption that it is computationally infeasible to factorize the product of two large prime numbers into its constituent primes. However, existing variants of RSA and Rabin cryptosystems suffer from issues like high computational complexity, low speed, and vulnerability to factorization attacks. To overcome the issue, this article proposes a new method that introduces the concept of fake-modulus during encryption. The proposed method aims to increase the security of the Rabin cryptosystem by introducing a fake-modulus during encryption, which is used to confuse attackers who attempt to factorize the public key. The fake-modulus is added to the original modulus during encryption, and the attacker is unable to distinguish between the two. As a result, the attacker is unable to factorize the public key and cannot access the sensitive information transmitted during electronic commerce transactions. The proposed method’s performance is evaluated using qualitative and quantitative measures. Qualitative measures such as visual analysis and histogram analysis are used to evaluate the proposed system’s quality. To quantify the performance of the proposed method, the entropy of a number of occurrences for the pixels of cipher text and differential analysis of plaintext and cipher text is used. When the proposed method’s complexity is compared to a recent variant of the Rabin cryptosystem, it can be seen that it is more complex to break the proposed method—represented as O(ɲ× τ) which is higher than Rabin-P (O(ɲ)) algorithms.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"08 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135064027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Divisions and Square Roots with Tight Error Analysis from Newton–Raphson Iteration in Secure Fixed-Point Arithmetic 安全不动点算法中牛顿-拉夫森迭代的除法和平方根紧密误差分析
Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-12 DOI: 10.3390/cryptography7030043
Stan Korzilius, Berry Schoenmakers
In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation of the reciprocal and the (reciprocal) square root. The protocols rely on secure fixed-point arithmetic with arbitrary precision parameterized by the total bit length of the fixed-point numbers and the bit length of the fractional part. We perform a rigorous error analysis aiming for tight accuracy claims while minimizing the overall cost of the protocols. Due to the nature of secure fixed-point arithmetic, we perform the analysis in terms of absolute errors. Whenever possible, we allow for stochastic (or probabilistic) rounding as an efficient alternative to deterministic rounding. We also present a new protocol for secure integer division based on our protocol for secure fixed-point reciprocals. The resulting protocol is parameterized by the bit length of the inputs and yields exact results for the integral quotient and remainder. The protocol is very efficient, minimizing the number of secure comparisons. Similarly, we present a new protocol for integer square roots based on our protocol for secure fixed-point square roots. The quadratic convergence of the Newton–Raphson method implies a logarithmic number of iterations as a function of the required precision (independent of the input value). The standard error analysis of the Newton–Raphson method focuses on the termination condition for attaining the required precision, assuming sufficiently precise floating-point arithmetic. We perform an intricate error analysis assuming fixed-point arithmetic of minimal precision throughout and minimizing the number of iterations in the worst case.
在本文中,我们提出了用于安全计算倒数和(倒数)平方根的牛顿-拉斐尔协议的新变体。该协议依赖于具有任意精度的安全定点算法,该算法由定点数的总位长和小数部分的位长参数化。我们执行严格的误差分析,旨在严格的精度要求,同时最大限度地降低协议的总体成本。由于安全不动点算法的性质,我们从绝对误差的角度进行分析。只要可能,我们允许随机(或概率)舍入作为确定性舍入的有效替代方案。在安全不动点倒数协议的基础上,提出了一种新的安全整数除法协议。所得到的协议由输入的位长度参数化,并为整商和余数产生精确的结果。该协议非常高效,最大限度地减少了安全比较的数量。同样,我们在安全不动点平方根协议的基础上,提出了一个新的整数平方根协议。Newton-Raphson方法的二次收敛性意味着迭代次数的对数作为所需精度的函数(与输入值无关)。牛顿-拉夫逊方法的标准误差分析集中在达到所需精度的终止条件上,假设浮点运算足够精确。我们进行了一个复杂的误差分析,假设在最坏的情况下,精度最小的定点算法和迭代次数最少。
{"title":"Divisions and Square Roots with Tight Error Analysis from Newton–Raphson Iteration in Secure Fixed-Point Arithmetic","authors":"Stan Korzilius, Berry Schoenmakers","doi":"10.3390/cryptography7030043","DOIUrl":"https://doi.org/10.3390/cryptography7030043","url":null,"abstract":"In this paper, we present new variants of Newton–Raphson-based protocols for the secure computation of the reciprocal and the (reciprocal) square root. The protocols rely on secure fixed-point arithmetic with arbitrary precision parameterized by the total bit length of the fixed-point numbers and the bit length of the fractional part. We perform a rigorous error analysis aiming for tight accuracy claims while minimizing the overall cost of the protocols. Due to the nature of secure fixed-point arithmetic, we perform the analysis in terms of absolute errors. Whenever possible, we allow for stochastic (or probabilistic) rounding as an efficient alternative to deterministic rounding. We also present a new protocol for secure integer division based on our protocol for secure fixed-point reciprocals. The resulting protocol is parameterized by the bit length of the inputs and yields exact results for the integral quotient and remainder. The protocol is very efficient, minimizing the number of secure comparisons. Similarly, we present a new protocol for integer square roots based on our protocol for secure fixed-point square roots. The quadratic convergence of the Newton–Raphson method implies a logarithmic number of iterations as a function of the required precision (independent of the input value). The standard error analysis of the Newton–Raphson method focuses on the termination condition for attaining the required precision, assuming sufficiently precise floating-point arithmetic. We perform an intricate error analysis assuming fixed-point arithmetic of minimal precision throughout and minimizing the number of iterations in the worst case.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135825286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced Authentication for Decentralized IoT Access Control Architecture 分散式物联网访问控制架构的增强认证
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-21 DOI: 10.3390/cryptography7030042
Jeong Hwa Kang, Minhye Seo
The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, leading to the proposal of numerous security frameworks and solutions to address these challenges. Authentication and authorization are crucial security requirements in the IoT environment, considering the potential risks posed by inadequate authentication and incorrect authorization. To comprehensively mitigate these issues, we presents a novel IoT access control architecture in this paper. The proposed architecture leverages the OAuth framework for authorization and the decentralized identity technology to enhance the authentication and authorization processes.
物联网(internet of things, IoT)通过人、物、服务之间的各种连接,实现超连接社会,提供智能服务和便利。然而,物联网的现状仍然面临着安全方面的限制。物联网中的安全问题备受关注,因此提出了许多安全框架和解决方案来应对这些挑战。考虑到不充分的身份验证和不正确的授权所带来的潜在风险,身份验证和授权是物联网环境中至关重要的安全需求。为了全面缓解这些问题,我们在本文中提出了一种新的物联网访问控制架构。所建议的体系结构利用OAuth框架进行授权,并利用分散身份技术增强身份验证和授权过程。
{"title":"Enhanced Authentication for Decentralized IoT Access Control Architecture","authors":"Jeong Hwa Kang, Minhye Seo","doi":"10.3390/cryptography7030042","DOIUrl":"https://doi.org/10.3390/cryptography7030042","url":null,"abstract":"The internet of things (IoT) enables a hyperconnected society, offering intelligent services and convenience through various connections between people, objects, and services. However, the current state of the IoT still faces limitations in security. Security issues in the IoT are of significant concern, leading to the proposal of numerous security frameworks and solutions to address these challenges. Authentication and authorization are crucial security requirements in the IoT environment, considering the potential risks posed by inadequate authentication and incorrect authorization. To comprehensively mitigate these issues, we presents a novel IoT access control architecture in this paper. The proposed architecture leverages the OAuth framework for authorization and the decentralized identity technology to enhance the authentication and authorization processes.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42802731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matrix Encryption Walks for Lightweight Cryptography 轻量级密码学的矩阵加密漫游
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-16 DOI: 10.3390/cryptography7030041
Aeryn Dunmore, Juliet Samandari, Julian Jang-Jaccard
In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simple in operation. The encryption, decryption, and key generation time, along with the bytes required to store the key, are all discussed, and similar proposed algorithms are examined and compared. We further discuss the avalanche effect, key space, frequency analysis, Shannon entropy, and chosen/known plaintext-ciphertext attacks, and how MEW remains robust against these attacks. We have also discussed the potential for future research into algorithms such as MEW, which make use of alternative structures and graphic methods for improving encryption models.
在本文中,我们提出了一种新的基于图遍历和二维矩阵的对称流密码加密算法,称为矩阵加密遍历(MEW)。我们提供了一个密钥矩阵的例子,并展示了所提出的方法的有效性,该方法在线性复杂度下运行,具有非常大的密钥空间和较低的资源需求。我们还提供了加密算法的概念验证代码,并对我们提出的MEW的安全性进行了详细分析。MEW算法是为物联网或智能设备等低资源环境设计的,因此操作简单。对加密、解密和密钥生成时间,以及存储密钥所需的字节进行了讨论,并对类似的算法进行了检查和比较。我们进一步讨论了雪崩效应、密钥空间、频率分析、香农熵和选择/已知明文密文攻击,以及MEW如何保持对这些攻击的鲁棒性。我们还讨论了未来研究MEW等算法的潜力,这些算法利用替代结构和图形方法来改进加密模型。
{"title":"Matrix Encryption Walks for Lightweight Cryptography","authors":"Aeryn Dunmore, Juliet Samandari, Julian Jang-Jaccard","doi":"10.3390/cryptography7030041","DOIUrl":"https://doi.org/10.3390/cryptography7030041","url":null,"abstract":"In this paper, we propose a new symmetric stream cipher encryption algorithm based on Graph Walks and 2-dimensional matrices, called Matrix Encryption Walks (MEW). We offer example Key Matrices and show the efficiency of the proposed method, which operates in linear complexity with an extremely large key space and low-resource requirements. We also provide the Proof of Concept code for the encryption algorithm and a detailed analysis of the security of our proposed MEW. The MEW algorithm is designed for low-resource environments such as IoT or smart devices and is therefore intended to be simple in operation. The encryption, decryption, and key generation time, along with the bytes required to store the key, are all discussed, and similar proposed algorithms are examined and compared. We further discuss the avalanche effect, key space, frequency analysis, Shannon entropy, and chosen/known plaintext-ciphertext attacks, and how MEW remains robust against these attacks. We have also discussed the potential for future research into algorithms such as MEW, which make use of alternative structures and graphic methods for improving encryption models.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49461019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Post-Quantum Cryptography: Start of a New Race 后量子密码学综述:一场新竞赛的开始
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-14 DOI: 10.3390/cryptography7030040
Duc-Thuan Dam, Thai-Ha Tran, Van‐Phuc Hoang, C. Pham, Trong-Thuc Hoang
Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computers and quantum algorithms, classical cryptographic techniques have been in danger of collapsing because quantum computers can solve complex problems in polynomial time. Stemming from that risk, researchers worldwide have stepped up research on post-quantum algorithms to resist attack by quantum computers. In this review paper, we survey studies in recent years on post-quantum cryptography (PQC) and provide statistics on the number and content of publications, including a literature overview, detailed explanations of the most common methods so far, current implementation status, implementation comparisons, and discussion on future work. These studies focused on essential public cryptography techniques and digital signature schemes, and the US National Institute of Standards and Technology (NIST) launched a competition to select the best candidate for the expected standard. Recent studies have practically implemented the public key encryption/key encapsulation mechanism (PKE/KEM) and digital signature schemes on different hardware platforms and applied various optimization measures based on other criteria. Along with the increasing number of scientific publications, the recent trend of PQC research is increasingly evident and is the general trend in the cryptography industry. The movement opens up a promising avenue for researchers in public key cryptography and digital signatures, especially on algorithms selected by NIST.
信息安全是数字化转型时代的一个基础性、紧迫性问题。加密技术和数字签名已被应用于保护和验证相关信息。然而,随着量子计算机和量子算法的出现,经典密码技术已经面临崩溃的危险,因为量子计算机可以在多项式时间内解决复杂问题。由于存在这种风险,世界各地的研究人员加强了对后量子算法的研究,以抵御量子计算机的攻击。在这篇综述文章中,我们调查了近年来关于后量子密码学(PQC)的研究,并统计了出版物的数量和内容,包括文献综述、迄今为止最常见方法的详细解释、当前实现状态、实现比较以及对未来工作的讨论。这些研究集中在基本的公共密码技术和数字签名方案上,美国国家标准与技术研究所(NIST)发起了一场竞赛,以选出预期标准的最佳候选者。最近的研究已经在不同的硬件平台上实际实现了公钥加密/密钥封装机制(PKE/KEM)和数字签名方案,并应用了基于其他标准的各种优化措施。随着科学出版物的不断增加,近年来PQC研究的趋势越来越明显,是密码学行业的大势所趋。这场运动为公钥密码学和数字签名的研究人员,特别是NIST选择的算法,开辟了一条充满希望的途径。
{"title":"A Survey of Post-Quantum Cryptography: Start of a New Race","authors":"Duc-Thuan Dam, Thai-Ha Tran, Van‐Phuc Hoang, C. Pham, Trong-Thuc Hoang","doi":"10.3390/cryptography7030040","DOIUrl":"https://doi.org/10.3390/cryptography7030040","url":null,"abstract":"Information security is a fundamental and urgent issue in the digital transformation era. Cryptographic techniques and digital signatures have been applied to protect and authenticate relevant information. However, with the advent of quantum computers and quantum algorithms, classical cryptographic techniques have been in danger of collapsing because quantum computers can solve complex problems in polynomial time. Stemming from that risk, researchers worldwide have stepped up research on post-quantum algorithms to resist attack by quantum computers. In this review paper, we survey studies in recent years on post-quantum cryptography (PQC) and provide statistics on the number and content of publications, including a literature overview, detailed explanations of the most common methods so far, current implementation status, implementation comparisons, and discussion on future work. These studies focused on essential public cryptography techniques and digital signature schemes, and the US National Institute of Standards and Technology (NIST) launched a competition to select the best candidate for the expected standard. Recent studies have practically implemented the public key encryption/key encapsulation mechanism (PKE/KEM) and digital signature schemes on different hardware platforms and applied various optimization measures based on other criteria. Along with the increasing number of scientific publications, the recent trend of PQC research is increasingly evident and is the general trend in the cryptography industry. The movement opens up a promising avenue for researchers in public key cryptography and digital signatures, especially on algorithms selected by NIST.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47585942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Applications of Neural Network-Based AI in Cryptography 基于神经网络的人工智能在密码学中的应用
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-11 DOI: 10.3390/cryptography7030039
Abderrahmane Nitaj, T. Rachidi
Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential technologies such as blockchain and cybersecurity also benefit from AI. As a core component used in blockchain and cybersecurity, cryptography can benefit from AI in order to enhance the confidentiality and integrity of cyberspace. In this paper, we review the algorithms underlying four prominent cryptographic cryptosystems, namely the Advanced Encryption Standard, the Rivest–Shamir–Adleman, Learning With Errors, and the Ascon family of cryptographic algorithms for authenticated encryption. Where possible, we pinpoint areas where AI can be used to help improve their security.
人工智能(AI)是一种现代技术,在日常生活中具有许多优势,如预测天气、寻找方向、对图像和视频进行分类,甚至自动生成代码、文本和视频。区块链和网络安全等其他重要技术也受益于人工智能。作为区块链和互联网安全的核心组件,密码学可以受益于人工智慧,以增强网络空间的机密性和完整性。在本文中,我们回顾了四个著名密码系统的算法,即高级加密标准、Rivest–Shamir–Adleman、带错误学习和用于身份验证加密的Ascon密码算法家族。在可能的情况下,我们会确定人工智能可以用来帮助提高其安全性的领域。
{"title":"Applications of Neural Network-Based AI in Cryptography","authors":"Abderrahmane Nitaj, T. Rachidi","doi":"10.3390/cryptography7030039","DOIUrl":"https://doi.org/10.3390/cryptography7030039","url":null,"abstract":"Artificial intelligence (AI) is a modern technology that allows plenty of advantages in daily life, such as predicting weather, finding directions, classifying images and videos, even automatically generating code, text, and videos. Other essential technologies such as blockchain and cybersecurity also benefit from AI. As a core component used in blockchain and cybersecurity, cryptography can benefit from AI in order to enhance the confidentiality and integrity of cyberspace. In this paper, we review the algorithms underlying four prominent cryptographic cryptosystems, namely the Advanced Encryption Standard, the Rivest–Shamir–Adleman, Learning With Errors, and the Ascon family of cryptographic algorithms for authenticated encryption. Where possible, we pinpoint areas where AI can be used to help improve their security.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45093720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Boosting Quantum Key Distribution via the End-to-End Loss Control 通过端到端损耗控制提高量子密钥分配
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-02 DOI: 10.3390/cryptography7030038
Aleksei D. Kodukhov, Valeria A. Pastushenko, Nikita S. Kirsanov, D. Kronberg, M. Pflitsch, V. Vinokur
With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum repeaters, cause relatively low key distribution rates in practical QKD implementations. Here, we demonstrate a remarkable improvement in the QKD performance using end-to-end line tomography for the wide class of relevant protocols. Our approach is based on the real-time detection of interventions in the transmission channel, enabling an adaptive response that modifies the QKD setup and post-processing parameters, leading, thereby, to a substantial increase in the key distribution rates. Our findings provide everlastingly secure efficient quantum cryptography deployment potentially overcoming the repeaterless rate-distance limit.
随着量子技术的兴起,数据安全越来越依赖于量子加密及其最显著的应用——量子密钥分发(QKD)。然而,目前的技术限制,特别是量子中继器的不可用性,导致在实际的QKD实现中密钥分发率相对较低。在这里,我们展示了在广泛的相关协议中使用端到端线断层扫描的QKD性能的显着改进。我们的方法是基于传输通道中干预的实时检测,实现自适应响应,修改QKD设置和后处理参数,从而导致密钥分发率的大幅增加。我们的发现提供了永久安全高效的量子密码部署,有可能克服无中继速率距离限制。
{"title":"Boosting Quantum Key Distribution via the End-to-End Loss Control","authors":"Aleksei D. Kodukhov, Valeria A. Pastushenko, Nikita S. Kirsanov, D. Kronberg, M. Pflitsch, V. Vinokur","doi":"10.3390/cryptography7030038","DOIUrl":"https://doi.org/10.3390/cryptography7030038","url":null,"abstract":"With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum repeaters, cause relatively low key distribution rates in practical QKD implementations. Here, we demonstrate a remarkable improvement in the QKD performance using end-to-end line tomography for the wide class of relevant protocols. Our approach is based on the real-time detection of interventions in the transmission channel, enabling an adaptive response that modifies the QKD setup and post-processing parameters, leading, thereby, to a substantial increase in the key distribution rates. Our findings provide everlastingly secure efficient quantum cryptography deployment potentially overcoming the repeaterless rate-distance limit.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43799998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Role of Blockchain in Medical Data Sharing 区块链在医疗数据共享中的作用
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-12 DOI: 10.3390/cryptography7030036
Hamed Taherdoost
As medical technology advances, there is an increasing need for healthcare providers all over the world to securely share a growing volume of data. Blockchain is a powerful technology that allows multiple parties to securely access and share data. Given the enormous challenge that healthcare systems face in digitizing and sharing health records, it is not unexpected that many are attempting to improve healthcare processes by utilizing blockchain technology. By systematically examining articles published from 2017 to 2022, this review addresses the existing gap by methodically discussing the state, research trends, and challenges of blockchain in medical data exchange. The number of articles on this issue has increased, reflecting the growing importance and interest in blockchain research for medical data exchange. Recent blockchain-based medical data sharing advances include safe healthcare management systems, health data architectures, smart contract frameworks, and encryption approaches. The evaluation examines medical data encryption, blockchain networks, and how the Internet of Things (IoT) improves hospital workflows. The findings show that blockchain can improve patient care and healthcare services by securely sharing data.
随着医疗技术的进步,世界各地的医疗保健提供者越来越需要安全地共享越来越多的数据。区块链是一种强大的技术,允许多方安全访问和共享数据。鉴于医疗保健系统在数字化和共享健康记录方面面临的巨大挑战,许多人正试图利用区块链技术改进医疗保健流程,这并不意外。通过系统地研究2017年至2022年发表的文章,本综述通过系统地讨论区块链在医疗数据交换中的现状、研究趋势和挑战,解决了现有的差距。关于这个问题的文章数量有所增加,反映出区块链研究对医疗数据交换的重要性和兴趣越来越大。最近基于区块链的医疗数据共享进展包括安全的医疗管理系统、健康数据架构、智能合约框架和加密方法。该评估考察了医疗数据加密、区块链网络以及物联网(IoT)如何改善医院工作流程。研究结果表明,区块链可以通过安全共享数据来改善患者护理和医疗保健服务。
{"title":"The Role of Blockchain in Medical Data Sharing","authors":"Hamed Taherdoost","doi":"10.3390/cryptography7030036","DOIUrl":"https://doi.org/10.3390/cryptography7030036","url":null,"abstract":"As medical technology advances, there is an increasing need for healthcare providers all over the world to securely share a growing volume of data. Blockchain is a powerful technology that allows multiple parties to securely access and share data. Given the enormous challenge that healthcare systems face in digitizing and sharing health records, it is not unexpected that many are attempting to improve healthcare processes by utilizing blockchain technology. By systematically examining articles published from 2017 to 2022, this review addresses the existing gap by methodically discussing the state, research trends, and challenges of blockchain in medical data exchange. The number of articles on this issue has increased, reflecting the growing importance and interest in blockchain research for medical data exchange. Recent blockchain-based medical data sharing advances include safe healthcare management systems, health data architectures, smart contract frameworks, and encryption approaches. The evaluation examines medical data encryption, blockchain networks, and how the Internet of Things (IoT) improves hospital workflows. The findings show that blockchain can improve patient care and healthcare services by securely sharing data.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45877098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks 基于统一无监督生成对抗性网络的经典密码模拟攻击
IF 1.6 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-11 DOI: 10.3390/cryptography7030035
Seong-Heum Park, Hyunil Kim, Inkyu Moon
Cryptanalysis has been studied and gradually improved with the evolution of cryptosystems over past decades. Recently, deep learning (DL) has started to be used in cryptanalysis to attack digital cryptosystems. As computing power keeps growing, deploying DL-based cryptanalysis becomes feasible in practice. However, since these studies can analyze only one cipher type for one DL model learning, it takes a lot of time to analyze multi ciphers. In this paper, we propose a unified cipher generative adversarial network (UC-GAN), which can perform ciphertext-to-plaintext translations among multiple domains (ciphers) using only a single DL model. In particular, the proposed model is based on unified unsupervised DL for the analysis of classical substitutional ciphers. Simulation results have indicated the feasibility and good performance of the proposed approach. In addition, we compared our experimental results with the findings of conditional GAN, where plaintext and ciphertext pairs in only the single domain are given as training data, and with CipherGAN, which is cipher mapping between unpaired ciphertext and plaintext in the single domain, respectively. The proposed model showed more than 97% accuracy by learning only data without prior knowledge of three substitutional ciphers. These findings could open a new possibility for simultaneously cracking various block ciphers, which has a great impact on the field of cryptography. To the best of our knowledge, this is the first study of the cryptanalysis of multiple cipher algorithms using only a single DL model
在过去的几十年里,随着密码系统的发展,密码分析得到了研究和逐步改进。最近,深度学习(DL)已开始用于密码分析,以攻击数字密码系统。随着计算能力的不断增长,部署基于DL的密码分析在实践中变得可行。然而,由于这些研究对于一个DL模型学习只能分析一种密码类型,因此分析多个密码需要花费大量时间。在本文中,我们提出了一种统一的密码生成对抗性网络(UC-GAN),该网络可以仅使用单个DL模型在多个域(密码)之间执行密文到明文的转换。特别地,所提出的模型基于统一的无监督DL,用于分析经典的替代密码。仿真结果表明了该方法的可行性和良好的性能。此外,我们将我们的实验结果与条件GAN的发现进行了比较,条件GAN仅将单个域中的明文和密文对作为训练数据,而CipherGAN是单个域中未配对密文和明文之间的密码映射。所提出的模型在没有三个替代密码的先验知识的情况下仅学习数据,显示出超过97%的准确率。这些发现为同时破解各种分组密码开辟了新的可能性,对密码学领域产生了巨大影响。据我们所知,这是首次使用单个DL模型对多个密码算法进行密码分析
{"title":"Automated Classical Cipher Emulation Attacks via Unified Unsupervised Generative Adversarial Networks","authors":"Seong-Heum Park, Hyunil Kim, Inkyu Moon","doi":"10.3390/cryptography7030035","DOIUrl":"https://doi.org/10.3390/cryptography7030035","url":null,"abstract":"Cryptanalysis has been studied and gradually improved with the evolution of cryptosystems over past decades. Recently, deep learning (DL) has started to be used in cryptanalysis to attack digital cryptosystems. As computing power keeps growing, deploying DL-based cryptanalysis becomes feasible in practice. However, since these studies can analyze only one cipher type for one DL model learning, it takes a lot of time to analyze multi ciphers. In this paper, we propose a unified cipher generative adversarial network (UC-GAN), which can perform ciphertext-to-plaintext translations among multiple domains (ciphers) using only a single DL model. In particular, the proposed model is based on unified unsupervised DL for the analysis of classical substitutional ciphers. Simulation results have indicated the feasibility and good performance of the proposed approach. In addition, we compared our experimental results with the findings of conditional GAN, where plaintext and ciphertext pairs in only the single domain are given as training data, and with CipherGAN, which is cipher mapping between unpaired ciphertext and plaintext in the single domain, respectively. The proposed model showed more than 97% accuracy by learning only data without prior knowledge of three substitutional ciphers. These findings could open a new possibility for simultaneously cracking various block ciphers, which has a great impact on the field of cryptography. To the best of our knowledge, this is the first study of the cryptanalysis of multiple cipher algorithms using only a single DL model","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":" ","pages":""},"PeriodicalIF":1.6,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44536103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptography
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1