328 research outputs found

    Plaintext Recovery in DES-like Cryptosystems Based on S-boxes with Embedded Parity Check

    Get PDF
    We describe an approach for recovering the plaintext in block ciphers having a design structure similar to the Data Encryption Standard but with improperly constructed S-boxes. The experiments with a backtracking search algorithm performing this kind of attack against modified DES/Triple-DES in ECB mode show that the unknown plaintext can be recovered with a small amount of uncertainty and this algorithm is highly efficient both in time and memory costs for plaintext sources with relatively low entropy. Our investigations demonstrate once again that modifications resulting to S-boxes which still satisfy some design criteria may lead to very weak ciphers. ACM Computing Classification System (1998): E.3, I.2.7, I.2.8.This work was presented in part at the 1-st International Conference Bulgarian Cryptography Days 2012, Sofia, Bulgaria, 20–21 September 2012

    Minimal Codewords in Linear Codes

    Get PDF
    2000 Mathematics Subject Classification: 94B05, 94B15.Cyclic binary codes C of block length n = 2^m − 1 and generator polynomial g(x) = m1(x)m2^s+1(x), (s, m) = 1, are considered. The cardinalities of the sets of minimal codewords of weights 10 and 11 in codes C and of weight 12 in their extended codes ^C are determined. The weight distributions of minimal codewords in the binary Reed-Muller codes RM (3, 6) and RM (3, 7) are determined. The applied method enables codes with larger parameters to be attacked

    Computing the Weight Distribution of the Binary Reed-Muller Code R(4,9){\mathcal R} (4,9)

    Full text link
    We compute the weight distribution of the R(4,9){\mathcal R} (4,9) by combining the approach described in D. V. Sarwate's Ph.D. thesis from 1973 with knowledge on the affine equivalence classification of Boolean functions. To solve this problem posed, e.g., in the MacWilliams and Sloane book [p. 447], we apply a refined approach based on the classification of Boolean quartic forms in 88 variables due to Ph. Langevin and G. Leander, and recent results on the classification of the quotient space R(4,7)/R(2,7){\mathcal R} (4,7)/{\mathcal R} (2,7) due to V. Gillot and Ph. Langevin

    A Note on the Irrationality of Angles of Kloosterman Sums over Finite Field

    Get PDF
    We prove that the angles of Kloosterman sums over arbitrary finite field are incommensurable with the constant π.Bulgarian NS Funder, Contract KP-06Russia/33/17.12.2020andContractKP-06-N32/2-2019

    An Efficient Approach to Point-Counting on Elliptic Curves from a Prominent Family over the Prime Field F_p

    Get PDF
    Here, we elaborate an approach for determining the number of points on elliptic curves from the family Ep={Ea:y2=x3+a(modp),a0}\mathcal{E_p} = \{E_a : y^2 = x^3 + a \pmod{p}, a\not= 0\}, where p is a prime number >3. The essence of this approach consists in combining the well-known Hasse bound with an explicit formula for the quantities of interest-reduced modulo pp. It allows to advance an efficient technique to compute the six cardinalities associated with the family Ep\mathcal{E_p}, for p1(mod3)p\equiv 1 \pmod{3}, whose complexity is O~(log2p)\tilde{O}(log^2p), thus improving the best-known algorithmic solution with almost an order of magnitude

    Covering Radius of the (n3)(n-3)-rd Order Reed-Muller Code in the Set of Resilient Functions

    Get PDF
    In this paper, we continue the study of the covering radius in the set of resilient functions, which has been defined by Kurosawa. This new concept is meaningful to cryptography especially in the context of the new class of algebraic attacks on stream ciphers proposed by Courtois and Meier at Eurocrypt 2003 and Courtois at Crypto 2003. In order to resist such attacks the combining Boolean function should be at high distance from lower degree functions. Using a result from coding theory on the covering radius of (n3)(n-3)-rd Reed-Muller codes, we establish exact values of the the covering radius of RM(n3,n)RM(n-3,n) in the set of 11-resilient Boolean functions of nn variables, when n/2=1mod  2\lfloor n/2 \rfloor = 1 \mod\;2. We also improve the lower bounds for covering radius of the Reed-Muller codes RM(r,n)RM(r,n) in the set of tt-resilient functions, where r/2=0mod  2\lceil r/2 \rceil = 0 \mod\;2, tnr2t \leq n-r-2 and nr+3n\geq r+3

    Search for dark matter produced in association with bottom or top quarks in √s = 13 TeV pp collisions with the ATLAS detector

    Get PDF
    A search for weakly interacting massive particle dark matter produced in association with bottom or top quarks is presented. Final states containing third-generation quarks and miss- ing transverse momentum are considered. The analysis uses 36.1 fb−1 of proton–proton collision data recorded by the ATLAS experiment at √s = 13 TeV in 2015 and 2016. No significant excess of events above the estimated backgrounds is observed. The results are in- terpreted in the framework of simplified models of spin-0 dark-matter mediators. For colour- neutral spin-0 mediators produced in association with top quarks and decaying into a pair of dark-matter particles, mediator masses below 50 GeV are excluded assuming a dark-matter candidate mass of 1 GeV and unitary couplings. For scalar and pseudoscalar mediators produced in association with bottom quarks, the search sets limits on the production cross- section of 300 times the predicted rate for mediators with masses between 10 and 50 GeV and assuming a dark-matter mass of 1 GeV and unitary coupling. Constraints on colour- charged scalar simplified models are also presented. Assuming a dark-matter particle mass of 35 GeV, mediator particles with mass below 1.1 TeV are excluded for couplings yielding a dark-matter relic density consistent with measurements
    corecore