Symmetrically and Asymmetrically Hard Cryptography (Full Version)*
نویسندگان
چکیده
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memory complexity. For a variety of reasons, many algorithms have been proposed that, instead of optimizing, try to increase one of these hardness forms. We present for the first time a unified framework for describing the hardness of a primitive along any of these three axes: code-hardness, timehardness and memory-hardness. This unified view allows us to present modular block cipher and sponge constructions which can have any of the three forms of hardness and can be used to build any higher level symmetric primitive: hash function, PRNG, etc. We also formalize a new concept: asymmetric hardness. It creates two classes of users: common users have to compute a function with a certain hardness while users knowing a secret can compute the same function in a far cheaper way. Functions with such an asymmetric hardness can be directly used in both our modular structures, thus constructing any symmetric primitive with an asymmetric hardness. We also propose the first asymmetrically memory-hard function, Diodon. As illustrations of our framework, we introduce Whale and Skipper. Whale is a code-hard hash function which could be used as a key derivation function and Skipper is the first asymmetrically time-hard block cipher.
منابع مشابه
Symmetrically dividing cell specific division axes alteration observed in proteasome depleted C. elegans embryo
A fertilised Caenorhabditis elegans embryo shows an invariable pattern of cell division and forms a multicellular body where each cell locates to a defined position. Mitotic spindle orientation is determined by several preceding events including the migration of duplicated centrosomes on a nucleus and the rotation of nuclear-centrosome complex. Cell polarity is the dominant force driving nuclea...
متن کاملA novel power-efficient scheme asymmetrically and symmetrically clipping optical (ASCO)-OFDM for IM/DD optical systems
In this paper, we propose a novel scheme of orthogonal frequency division multiplexing (OFDM) for intensity modulation direct detection (IM/DD) optical systems. By using this novel scheme of an OFDM optical system, not only odd subcarriers but also even subcarriers can be modulated to transmit a clipping optical signal. A conventional asymmetrically clipping optical (ACO)-OFDM is applied to mod...
متن کامل3D mid-air manipulation techniques above stereoscopic tabletops
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitte...
متن کامل6.845 Project: Classical Cryptography, Quantum Queries
. In Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, CRYPTO ’95, pages 424–437, London, UK, UK, 1995. Springer-Verlag. [4] Dan Boneh, Ozgu r Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, and Mark Zhandry. Random oracles in a quantum world. In Proceedings of Asiacrypt, 2011. Full version available at the Cryptology ePrint Archives: http...
متن کاملMyocardial fiber orientation mapping using reduced encoding diffusion tensor imaging.
A precise knowledge of the myocardial fiber architecture is essential to accurately understand and interpret cardiac electrical and mechanical functions. Diffusion tensor imaging has been used to noninvasively and quantitatively characterize myocardial fiber orientations. However, because the approach necessitates diffusion to be measured in multiple encoding directions and frequently at multip...
متن کامل