3,768 research outputs found

    A Polynomial Description of the Rijndael Advanced Encryption Standard

    Full text link
    The paper gives a polynomial description of the Rijndael Advanced Encryption Standard recently adopted by the National Institute of Standards and Technology. Special attention is given to the structure of the S-Box.Comment: 12 pages, LaTe

    sh(2/2) Superalgebra eigenstates and generalized supercoherent and supersqueezed states

    Full text link
    The superalgebra eigenstates (SAES) concept is introduced and then applied to find the SAES associated to the sh(2/2)sh(2/2) superalgebra, also known as Heisenberg--Weyl Lie superalgebra. This implies to solve a Grassmannian eigenvalue superequation. Thus, the sh(2/2)sh(2/2) SAES contain the class of supercoherent states associated to the supersymmetric harmonic oscillator and also a class of supersqueezed states associated to the osp(2/2) \sdir sh(2/2) superalgebra, where osp(2/2)osp(2/2) denotes the orthosymplectic Lie superalgebra generated by the set of operators formed from the quadratic products of the Heisenberg--Weyl Lie superalgebra generators. The properties of these states are investigated and compared with those of the states obtained by applying the group-theoretical technics. Moreover, new classes of generalized supercoherent and supersqueezed states are also obtained. As an application, the superHermitian and η\eta--pseudo--superHermitian Hamiltonians without a defined Grassmann parity and isospectral to the harmonic oscillator are constructed. Their eigenstates and associated supercoherent states are calculated.Comment: 42 page

    Essential Agebraic Structure within the AES

    Get PDF

    A Chaos-Based Authenticated Cipher with Associated Data

    Get PDF
    In recent years, there has been a rising interest in authenticated encryptionwith associated data (AEAD)which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true randomnumber generators to map a message tomultiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption

    Performance evaluation of eXtended sparse linearization in GF(2) and GF(28)

    Get PDF
    XSL (eXtended Sparse Linearization) is a recent algebraic attack aimed at the Advanced Encryption Standard. In order to shed some light into the behavior of the algorithm, which is largely unknown, we have studied XSL on equation systems with variables interpreted either as bits or bytes. The algorithm solves byte-systems much faster than it does bit-systems, which promts us to suggest that if a more compact representation of equation systems can be found, such as one where the variables are 8-byte blocks, or even a more generalized form of 8n-byte blocks, it may be possible to increase the speed of XSL dramatically

    Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment

    Get PDF
    Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information

    A Selective Encryption Algorithm Based on AES for Medical Information

    Get PDF
    corecore