Analysis of a Multivariate Public Key Cryptosystem and Its Application in Software Copy Protection

نویسنده

  • Ning Huang
چکیده

We analysed and solved possible singularity for an improved MFE multivariate public key (Medium Field Multivariate Public Key Encryption) and studied the use of it in software copy protection. We used our new MFE multivariate public key cryptosystem to design an algorithm of software registration, in which a given plaintext can result in multi-cipher-text.. The breaking is hard because the ciphertext is variable. The ability to withstand algebraic attacks is enhanced. The dependence of registration string on the fingerprints of machine prevents any registration string from being shared by multiple machines..

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

Single-Carrier Space Time Transmission Diversity with Decision Feedback Equalization

REGULAR PAPERS An Improved Image Segmentation Algorithm Based on GPU Parallel Computing Haiyang Li, Zhaofeng Yang, and Hongzhou He Privacy-Preserving Location Assurance Protocols for Mobile Applications Genqiang Wu, Yeping He, Yi Lu, and Liping Ding Conversion of Sign Language to Spoken Sentences by Means of a Sensory Glove Pietro Cavallo and Giovanni Saggio Analysis of a Multivariate Public Ke...

متن کامل

EEH: AGGH-like public key cryptosystem over the eisenstein integers using polynomial representations

GGH class of public-key cryptosystems relies on computational problems based on the closest vector problem (CVP) in lattices for their security. The subject of lattice based cryptography is very active and there have recently been new ideas that revolutionized the field. We present EEH, a GGH-Like public key cryptosystem based on the Eisenstein integers Z [ζ3] where ζ3 is a primitive...

متن کامل

General Fault Attacks on Multivariate Public Key Cryptosystems

General fault attacks on multivariate public key cryptosystems

متن کامل

An Enhanced Hill Cipher and Its Application in Software Copy Protection

To protect software from unauthorized use, registration key is frequently used in the field of permission control. For the security of such a system, the key issue is to design a robust algorithm. We propose an enhanced scheme of Hill cipher based on variable modulus and algebraic alphabet to protect software copy, which uses tridiagonal matrix. Since the modulus is not a fixed number and the a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • JSW

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2014