Security analysis of an encryption scheme based on nonpositional polynomial notations

The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (RNSs) based on irreducible polynomials over G...

Full description

Bibliographic Details
Main Authors: Kapalova Nursulu, Dyusenbayev Dilmukhanbet
Format: Article
Language:English
Published: De Gruyter 2016-01-01
Series:Open Engineering
Subjects:
Online Access:http://www.degruyter.com/view/j/eng.2016.6.issue-1/eng-2016-0034/eng-2016-0034.xml?format=INT
id doaj-c95c525fe1044d399f81c167b134f25c
record_format Article
spelling doaj-c95c525fe1044d399f81c167b134f25c2020-11-25T01:12:30ZengDe GruyterOpen Engineering2391-54392016-01-016110.1515/eng-2016-0034eng-2016-0034Security analysis of an encryption scheme based on nonpositional polynomial notationsKapalova Nursulu0Dyusenbayev Dilmukhanbet1Institute Information and Computational Technologies Almaty, KazakhstanInstitute Information and Computational Technologies Almaty, KazakhstanThe aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (RNSs) based on irreducible polynomials over GF(2). To evaluate if the algorithms developed on the basis of NPNs are secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been designed. The cryptanalysis is as follows. A system of nonlinear equations is obtained from a function transforming plaintext into ciphertext with a key. Next, a possibility of transition of the nonlinear system to a linear one is considered. The cryptanalysis was conducted for the cases with known: 1) ciphertext; 2) plaintext and the related ciphertext; 3) plaintext file format; and 4) ASCII-encoded plaintext.http://www.degruyter.com/view/j/eng.2016.6.issue-1/eng-2016-0034/eng-2016-0034.xml?format=INTcryptography encryption nonpositional polynominal notations cryptostrength residue cryptanalysis
collection DOAJ
language English
format Article
sources DOAJ
author Kapalova Nursulu
Dyusenbayev Dilmukhanbet
spellingShingle Kapalova Nursulu
Dyusenbayev Dilmukhanbet
Security analysis of an encryption scheme based on nonpositional polynomial notations
Open Engineering
cryptography
encryption
nonpositional polynominal notations
cryptostrength
residue
cryptanalysis
author_facet Kapalova Nursulu
Dyusenbayev Dilmukhanbet
author_sort Kapalova Nursulu
title Security analysis of an encryption scheme based on nonpositional polynomial notations
title_short Security analysis of an encryption scheme based on nonpositional polynomial notations
title_full Security analysis of an encryption scheme based on nonpositional polynomial notations
title_fullStr Security analysis of an encryption scheme based on nonpositional polynomial notations
title_full_unstemmed Security analysis of an encryption scheme based on nonpositional polynomial notations
title_sort security analysis of an encryption scheme based on nonpositional polynomial notations
publisher De Gruyter
series Open Engineering
issn 2391-5439
publishDate 2016-01-01
description The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (RNSs) based on irreducible polynomials over GF(2). To evaluate if the algorithms developed on the basis of NPNs are secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been designed. The cryptanalysis is as follows. A system of nonlinear equations is obtained from a function transforming plaintext into ciphertext with a key. Next, a possibility of transition of the nonlinear system to a linear one is considered. The cryptanalysis was conducted for the cases with known: 1) ciphertext; 2) plaintext and the related ciphertext; 3) plaintext file format; and 4) ASCII-encoded plaintext.
topic cryptography
encryption
nonpositional polynominal notations
cryptostrength
residue
cryptanalysis
url http://www.degruyter.com/view/j/eng.2016.6.issue-1/eng-2016-0034/eng-2016-0034.xml?format=INT
work_keys_str_mv AT kapalovanursulu securityanalysisofanencryptionschemebasedonnonpositionalpolynomialnotations
AT dyusenbayevdilmukhanbet securityanalysisofanencryptionschemebasedonnonpositionalpolynomialnotations
_version_ 1725165984513261568