Security analysis of an encryption scheme based on nonpositional polynomial notations
The aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (RNSs) based on irreducible polynomials over G...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2016-01-01
|
Series: | Open Engineering |
Subjects: | |
Online Access: | http://www.degruyter.com/view/j/eng.2016.6.issue-1/eng-2016-0034/eng-2016-0034.xml?format=INT |
id |
doaj-c95c525fe1044d399f81c167b134f25c |
---|---|
record_format |
Article |
spelling |
doaj-c95c525fe1044d399f81c167b134f25c2020-11-25T01:12:30ZengDe GruyterOpen Engineering2391-54392016-01-016110.1515/eng-2016-0034eng-2016-0034Security analysis of an encryption scheme based on nonpositional polynomial notationsKapalova Nursulu0Dyusenbayev Dilmukhanbet1Institute Information and Computational Technologies Almaty, KazakhstanInstitute Information and Computational Technologies Almaty, KazakhstanThe aim of the research was to conduct a cryptographic analysis of an encryption scheme developed on the basis of nonpositional polynomial notations to estimate the algorithm strength. Nonpositional polynomial notations (NPNs) are residue number systems (RNSs) based on irreducible polynomials over GF(2). To evaluate if the algorithms developed on the basis of NPNs are secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been designed. The cryptanalysis is as follows. A system of nonlinear equations is obtained from a function transforming plaintext into ciphertext with a key. Next, a possibility of transition of the nonlinear system to a linear one is considered. The cryptanalysis was conducted for the cases with known: 1) ciphertext; 2) plaintext and the related ciphertext; 3) plaintext file format; and 4) ASCII-encoded plaintext.http://www.degruyter.com/view/j/eng.2016.6.issue-1/eng-2016-0034/eng-2016-0034.xml?format=INTcryptography encryption nonpositional polynominal notations cryptostrength residue cryptanalysis |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Kapalova Nursulu Dyusenbayev Dilmukhanbet |
spellingShingle |
Kapalova Nursulu Dyusenbayev Dilmukhanbet Security analysis of an encryption scheme based on nonpositional polynomial notations Open Engineering cryptography encryption nonpositional polynominal notations cryptostrength residue cryptanalysis |
author_facet |
Kapalova Nursulu Dyusenbayev Dilmukhanbet |
author_sort |
Kapalova Nursulu |
title |
Security analysis of an encryption scheme based
on nonpositional polynomial notations |
title_short |
Security analysis of an encryption scheme based
on nonpositional polynomial notations |
title_full |
Security analysis of an encryption scheme based
on nonpositional polynomial notations |
title_fullStr |
Security analysis of an encryption scheme based
on nonpositional polynomial notations |
title_full_unstemmed |
Security analysis of an encryption scheme based
on nonpositional polynomial notations |
title_sort |
security analysis of an encryption scheme based
on nonpositional polynomial notations |
publisher |
De Gruyter |
series |
Open Engineering |
issn |
2391-5439 |
publishDate |
2016-01-01 |
description |
The aim of the research was to conduct a cryptographic
analysis of an encryption scheme developed
on the basis of nonpositional polynomial notations to
estimate the algorithm strength. Nonpositional polynomial
notations (NPNs) are residue number systems (RNSs)
based on irreducible polynomials over GF(2). To evaluate
if the algorithms developed on the basis of NPNs are
secure, mathematical models of cryptanalysis involving
algebraic, linear and differential methods have been designed.
The cryptanalysis is as follows. A system of nonlinear
equations is obtained from a function transforming
plaintext into ciphertext with a key. Next, a possibility of
transition of the nonlinear system to a linear one is considered.
The cryptanalysis was conducted for the cases with
known: 1) ciphertext; 2) plaintext and the related ciphertext;
3) plaintext file format; and 4) ASCII-encoded plaintext. |
topic |
cryptography encryption nonpositional polynominal notations cryptostrength residue cryptanalysis |
url |
http://www.degruyter.com/view/j/eng.2016.6.issue-1/eng-2016-0034/eng-2016-0034.xml?format=INT |
work_keys_str_mv |
AT kapalovanursulu securityanalysisofanencryptionschemebasedonnonpositionalpolynomialnotations AT dyusenbayevdilmukhanbet securityanalysisofanencryptionschemebasedonnonpositionalpolynomialnotations |
_version_ |
1725165984513261568 |