简介:Patarinproposedthedragonscheme,pointedouttheinsecurityofthedragonalgorithmwithonehiddenmonomialandsuggestedacandidatedragonsignaturealgorithmwithacomplicatedfunction.Thispaperpresentsanalgebraicmethodtoattackthecandidatedragonsignaturealgorithm.TheattackborrowsthebasicideaoftheattackduetoKipnisandShamir,andutilizestheunderlyingalgebraicstructureofthecandidatedragonsignaturealgorithmovertheextensionfieldtoderiveawaytoenablethevariableYbeviewedasafixedvalue.Theattackrecoverstheprivatekeysefficientlywhentheparametersaren≤25andD=[logqd]≤3.
简介:ThecontinuedfractiontacticsforcryptanalysisbasedonLegendreTheoremofcontinuedfractionareproposed.
简介:在2013年6月,美国国家安全机构分别地建议了小块零,叫的SIMON和斑点的二个家庭。这些零被设计在硬件和软件平台上最优地表现。在这份报纸,我们主要在SIMON的各种各样的版本上介绍零关联的线性密码翻译法。由使用missin-the-middle途径,第一,我们构造零关联的线性distinguishersSIMON,和零关联的线性攻击基于关键恢复的小心的分析被介绍阶段。第二,多维的零关联的线性攻击被用来减少数据复杂性。我们的零关联的线性攻击比不可能的微分攻击求婚由的更好表现卧病在床等。在ePrint报告2013/568。最后,我们也使用divide-and-conquer技术改进Javad等建议的线性密码翻译法的结果。在ePrint报告2013/663。
简介:ItiswellknownthatthealgebraicexpressionofASSS-boxisverysimpleandonly9termsareinvolved.Hence,AESsecurityissuspectedalthoughthereisnovulnerabilityonitsofar.ToeliminatetheweaknessofextremelysmalltermsinthealgebraicexpressionofAESS-box,oneimprovedAESS-boxisproposed,whichpreservesthealgebraicdegreeinvariablebutsignificantlyincreasesthenumberofitsalgebraicexpressiontermsfrom9to255.Atthesametime,Booleanfunctionhasgoodcharactersinbalanceandstrictavalanchecriterion(SAC),etc.Finally,itisprovedthattheimprovedAESS-boxschemeissecuregainstthepowerfulknowndifferentialandlinearcryptanalysis.
简介:Recently,Liuetal.[Commun.Theor.Phys.57(2012)583]proposedaquantumprivatecomparisonprotocolbasedonentanglementswappingofBellstates,whichaimstosecurelycomparetheequalityoftwoparticipants’informationwiththehelpofasemi-honestthirdparty(TP).However,thepresentstudypointsoutthereisafatalloopholeinLiuetal.’sprotocol,andTPcanmakeBell-basismeasurementtoknowalltheparticipants’secretinputswithoutbeingdetected.Tofixtheproblem,asimplesolution,whichusesone-timeeavesdroppercheckingwithdecoyphotonsinsteadoftwiceeavesdroppercheckingwithBellstates,isdemonstrated.Comparedwiththeoriginalprotocol,itnotonlyreducestheBellstatesconsumptionbutalsosimplifiestheprotocolsteps.