A Note on Automata-based Dynamic Convolutional Cryptosystems
نویسنده
چکیده
In [1], the automata-based dynamic convolutional cryptosystem is proposed and analyzed; the author claims that “finding partial information about the cipher is quite easy, and the main idea of such an attack, described in detail in Section 4.1, is based on Gaussian elimination.” But the deduction supporting this claim in Section 4.1 of [1] cannot work. It seems that this cipher is not so weak so far. 1 Definition of ADCC Recall some definitions. 1 A finite automaton, say M , is a quintuple 〈X, Y, S, δ, λ〉, where X is a nonempty finite set (the input alphabet of M), Y a nonempty finite set (the output alphabet of M), S a nonempty finite set (the state alphabet of M), δ : S ×X → S a single-valued mapping (the next state function of M), and λ : S×X → Y a single-valued mapping (the output function of M). For any set A, we use A∗ to denote the set of all words (finite sequences) over A including the empty word ε. Expand the domains of δ and λ to S ×X∗ as follows. δ(s, ε) = s, δ(s, αx) = δ(δ(s, α), x), λ(s, ε) = ε, λ(s, αx) = λ(s, α)λ(δ(s, α), x), s ∈ S, x ∈ X, α ∈ X∗. In [1], Trincă proposed a symmetric cryptosystem, named automata-based dynamic convolutional cryptosystem (ADCC for short) with q states. The encoder of an ADCC is a finite automaton, say M = 〈X, Y, S, δ, λ〉, where X and Y are the k-dimensional row vector space over GF (2) (the field with 2 elements), S = Xm×{1, . . . , q} = {〈x−1, . . . , x−m, w〉 | xi ∈ X, i = −1, . . . ,−m,w = 1, . . . , q}, q and m being two positive integers, δ(〈x−1, . . . , x−m, w〉, x0) = 〈x0, . . . , x−m+1, f(w, x0)〉, λ(〈x−1, . . . , x−m, w〉, x0) = m ∑
منابع مشابه
Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems
With the exception of the recently proposed class of cascaded dynamic convolutional cryptosystems, all the symmetric cryptosystems studied so far in the literature are static, in the sense that their structure do not change at all during encryption/decryption. In this paper, we propose and analyze a new class of dynamic symmetric cryptosystems, called automata-based dynamic convolutional crypto...
متن کاملQTRU: quaternionic version of the NTRU public-key cryptosystems
In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...
متن کاملA Convolutional Neural Network based on Adaptive Pooling for Classification of Noisy Images
Convolutional neural network is one of the effective methods for classifying images that performs learning using convolutional, pooling and fully-connected layers. All kinds of noise disrupt the operation of this network. Noise images reduce classification accuracy and increase convolutional neural network training time. Noise is an unwanted signal that destroys the original signal. Noise chang...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملCreating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks
Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2007 شماره
صفحات -
تاریخ انتشار 2007