3,768 research outputs found
A Polynomial Description of the Rijndael Advanced Encryption Standard
The paper gives a polynomial description of the Rijndael Advanced Encryption
Standard recently adopted by the National Institute of Standards and
Technology. Special attention is given to the structure of the S-Box.Comment: 12 pages, LaTe
sh(2/2) Superalgebra eigenstates and generalized supercoherent and supersqueezed states
The superalgebra eigenstates (SAES) concept is introduced and then applied to
find the SAES associated to the superalgebra, also known as
Heisenberg--Weyl Lie superalgebra. This implies to solve a Grassmannian
eigenvalue superequation. Thus, the SAES contain the class of
supercoherent states associated to the supersymmetric harmonic oscillator and
also a class of supersqueezed states associated to the osp(2/2) \sdir sh(2/2)
superalgebra, where denotes the orthosymplectic Lie superalgebra
generated by the set of operators formed from the quadratic products of the
Heisenberg--Weyl Lie superalgebra generators. The properties of these states
are investigated and compared with those of the states obtained by applying the
group-theoretical technics. Moreover, new classes of generalized supercoherent
and supersqueezed states are also obtained. As an application, the
superHermitian and --pseudo--superHermitian Hamiltonians without a
defined Grassmann parity and isospectral to the harmonic oscillator are
constructed. Their eigenstates and associated supercoherent states are
calculated.Comment: 42 page
A Chaos-Based Authenticated Cipher with Associated Data
In recent years, there has been a rising interest in authenticated encryptionwith associated data (AEAD)which combines encryption and authentication into a unified scheme. AEAD schemes provide authentication for a message that is divided into two parts: associated data which is not encrypted and the plaintext which is encrypted. However, there is a lack of chaos-based AEAD schemes in recent literature. This paper introduces a new128-bit chaos-based AEAD scheme based on the single-key Even-Mansour and Type-II generalized Feistel structure. The proposed scheme provides both privacy and authentication in a single-pass using only one 128-bit secret key. The chaotic tent map is used to generate whitening keys for the Even-Mansour construction, round keys, and random s-boxes for the Feistel round function. In addition, the proposed AEAD scheme can be implemented with true randomnumber generators to map a message tomultiple possible ciphertexts in a nondeterministic manner. Security and statistical evaluation indicate that the proposed scheme is highly secure for both the ciphertext and the authentication tag. Furthermore, it has multiple advantages over AES-GCM which is the current standard for authenticated encryption
Performance evaluation of eXtended sparse linearization in GF(2) and GF(28)
XSL (eXtended Sparse Linearization) is a recent algebraic attack aimed at the Advanced Encryption Standard. In order to shed some light into the behavior of the algorithm, which is largely unknown, we have studied XSL on equation systems with variables interpreted either as bits or bytes. The algorithm solves byte-systems much faster than it does bit-systems, which promts us to suggest that if a more compact representation of equation systems can be found, such as one where the variables are 8-byte blocks, or even a more generalized form of 8n-byte blocks, it may be possible to increase the speed of XSL dramatically
Enhancing Electromagnetic Side-Channel Analysis in an Operational Environment
Side-channel attacks exploit the unintentional emissions from cryptographic devices to determine the secret encryption key. This research identifies methods to make attacks demonstrated in an academic environment more operationally relevant. Algebraic cryptanalysis is used to reconcile redundant information extracted from side-channel attacks on the AES key schedule. A novel thresholding technique is used to select key byte guesses for a satisfiability solver resulting in a 97.5% success rate despite failing for 100% of attacks using standard methods. Two techniques are developed to compensate for differences in emissions from training and test devices dramatically improving the effectiveness of cross device template attacks. Mean and variance normalization improves same part number attack success rates from 65.1% to 100%, and increases the number of locations an attack can be performed by 226%. When normalization is combined with a novel technique to identify and filter signals in collected traces not related to the encryption operation, the number of traces required to perform a successful attack is reduced by 85.8% on average. Finally, software-defined radios are shown to be an effective low-cost method for collecting side-channel emissions in real-time, eliminating the need to modify or profile the target encryption device to gain precise timing information
- …