A Note on Automata-based Dynamic Convolutional Cryptosystems

نویسنده

  • Renji Tao
چکیده

In [1], the automata-based dynamic convolutional cryptosystem is proposed and analyzed; the author claims that “finding partial information about the cipher is quite easy, and the main idea of such an attack, described in detail in Section 4.1, is based on Gaussian elimination.” But the deduction supporting this claim in Section 4.1 of [1] cannot work. It seems that this cipher is not so weak so far. 1 Definition of ADCC Recall some definitions. 1 A finite automaton, say M , is a quintuple 〈X, Y, S, δ, λ〉, where X is a nonempty finite set (the input alphabet of M), Y a nonempty finite set (the output alphabet of M), S a nonempty finite set (the state alphabet of M), δ : S ×X → S a single-valued mapping (the next state function of M), and λ : S×X → Y a single-valued mapping (the output function of M). For any set A, we use A∗ to denote the set of all words (finite sequences) over A including the empty word ε. Expand the domains of δ and λ to S ×X∗ as follows. δ(s, ε) = s, δ(s, αx) = δ(δ(s, α), x), λ(s, ε) = ε, λ(s, αx) = λ(s, α)λ(δ(s, α), x), s ∈ S, x ∈ X, α ∈ X∗. In [1], Trincă proposed a symmetric cryptosystem, named automata-based dynamic convolutional cryptosystem (ADCC for short) with q states. The encoder of an ADCC is a finite automaton, say M = 〈X, Y, S, δ, λ〉, where X and Y are the k-dimensional row vector space over GF (2) (the field with 2 elements), S = Xm×{1, . . . , q} = {〈x−1, . . . , x−m, w〉 | xi ∈ X, i = −1, . . . ,−m,w = 1, . . . , q}, q and m being two positive integers, δ(〈x−1, . . . , x−m, w〉, x0) = 〈x0, . . . , x−m+1, f(w, x0)〉, λ(〈x−1, . . . , x−m, w〉, x0) = m ∑

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient FPGA Implementations and Cryptanalysis of Automata-based Dynamic Convolutional Cryptosystems

With the exception of the recently proposed class of cascaded dynamic convolutional cryptosystems, all the symmetric cryptosystems studied so far in the literature are static, in the sense that their structure do not change at all during encryption/decryption. In this paper, we propose and analyze a new class of dynamic symmetric cryptosystems, called automata-based dynamic convolutional crypto...

متن کامل

QTRU: quaternionic version of the NTRU public-key cryptosystems

In this paper we will construct a lattice-based public-key cryptosystem using non-commutative quaternion algebra, and since its lattice does not fully fit within Circular and Convolutional Modular Lattice (CCML), we prove it is arguably more secure than the existing lattice-based cryptosystems such as NTRU. As in NTRU, the proposed public-key cryptosystem relies for its inherent securi...

متن کامل

A Convolutional Neural Network based on Adaptive Pooling for Classification of Noisy Images

Convolutional neural network is one of the effective methods for classifying images that performs learning using convolutional, pooling and fully-connected layers. All kinds of noise disrupt the operation of this network. Noise images reduce classification accuracy and increase convolutional neural network training time. Noise is an unwanted signal that destroys the original signal. Noise chang...

متن کامل

Creating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks

Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...

متن کامل

Creating Dynamic Sub-Route to Control Congestion Based on Learning Automata Technique in Mobile Ad Hoc Networks

Ad hoc mobile networks have dynamic topology with no central management. Because of the high mobility of nodes, the network topology may change constantly, so creating a routing with high reliability is one of the major challenges of these networks .In the proposed framework first, by finding directions to the destination and calculating the value of the rout the combination of this value with ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2007  شماره 

صفحات  -

تاریخ انتشار 2007