Partitioning Multivariate Polynomial Equations via Vertex Separators for Algebraic Cryptanalysis and Mathematical Applications
نویسندگان
چکیده
We present a novel approach for solving systems of polynomialequations via graph partitioning. The concept of a variable-sharing graph of asystem of polynomial equations is defined. If such graph is disconnected, thenthe system of equations is actually two separate systems that can be solvedindividually. This can provide a significant speed-up in computing the solutionto the system, but is unlikely to occur either randomly or in applications.However, by deleting a small number of vertices on the graph, the variable-sharing graph could be disconnected in a balanced fashion, and in turn thesystem of polynomial equations are separated into smaller ones of similarsizes. In graph theory terms, this process is equivalent to finding balancedvertex partitions with minimum-weight vertex separators.The techniques of finding these vertex partitions are discussed, and ex-periments are performed to evaluate its practicality for general graphs andsystems of polynomial equations. Applications of this approach to the QUADfamily of stream ciphers, algebraic cryptanalysis of the stream cipher Triv-ium and its variants, as well as some mathematical problems in game theoryand computational algebraic geometry are presented. In each of these cases,the systems of polynomial equations involved are well-suited to our graphpartitioning method, and constructive results are discussed. Mathematics Subject Classification (2000). 05C90, 11T71, 68R10, 94A60, 14G50.
منابع مشابه
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems
We present a novel approach for preprocessing systems of polynomial equations via graph partitioning. The variable-sharing graph of a system of polynomial equations is defined. If such graph is disconnected, then the corresponding system of equations can be split into smaller ones that can be solved individually. This can provide a tremendous speed-up in computing the solution to the system, bu...
متن کاملGraph Partitioning Algorithms with Applications to Scientific Computing Graph Partitioning Algorithms
Identifying the parallelism in a problem by partitioning its data and tasks among the processors of a parallel computer is a fundamental issue in parallel computing. This problem can be modeled as a graph partitioning problem in which the vertices of a graph are divided into a speciied number of subsets such that few edges join two vertices in diierent subsets. Several new graph partitioning al...
متن کاملSolving Structured Polynomial Systems and Applications to Cryptology
Cryptography is a collection of mathematical techniques used to secure the transmission and storage of information. A fundamental problem in cryptography is to evaluate the security of cryptosystems against the most powerful techniques. To this end, several general methods have been proposed: linear cryptanalysis, differential cryptanalysis, . . . Extensively used cryptographic standards – such...
متن کاملComputational and Algebraic Aspects of the Advanced Encryption Standard
The new Advanced Encryption Standard (AES) has been recently selected by the US government to replace the old Data Encryption Standard (DES) for protecting sensitive official information. Due to its simplicity and elegant algebraic structure, the choice of the AES algorithm has motivated the study of a new approach to the analysis of block ciphers. While conventional methods of cryptanalysis (e...
متن کاملComparative study on solving fractional differential equations via shifted Jacobi collocation method
In this paper, operational matrices of Riemann-Liouville fractional integration and Caputo fractional differentiation for shifted Jacobi polynomials are considered. Using the given initial conditions, we transform the fractional differential equation (FDE) into a modified fractional differential equation with zero initial conditions. Next, all the existing functions in modified differential equ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2009 شماره
صفحات -
تاریخ انتشار 2009