12 research outputs found

    EHE: nonce misuse-resistant message authentication

    Get PDF
    We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The resulting polynomial hash value is encrypted again and becomes an authentication tag. We prove the prf-security of the EHE scheme and extend it to two authenticated encryption modes which follow the “encrypt-then-authenticate” paradigm

    Mathematical methods in solutions of the problems from the Third International Students' Olympiad in Cryptography

    Get PDF
    The mathematical problems and their solutions of the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016 are presented. We consider mathematical problems related to the construction of algebraic immune vectorial Boolean functions and big Fermat numbers, problems about secrete sharing schemes and pseudorandom binary sequences, biometric cryptosystems and the blockchain technology, etc. Two open problems in mathematical cryptography are also discussed and a solution for one of them proposed by a participant during the Olympiad is described. It was the first time in the Olympiad history

    The Seventh International Olympiad in Cryptography: problems and solutions

    Full text link
    The International Olympiad in Cryptography NSUCRYPTO is the unique Olympiad containing scientific mathematical problems for professionals, school and university students from any country. Its aim is to involve young researchers in solving curious and tough scientific problems of modern cryptography. In 2020, it was held for the seventh time. Prizes and diplomas were awarded to 84 participants in the first round and 49 teams in the second round from 32 countries. In this paper, problems and their solutions of NSUCRYPTO'2020 are presented. We consider problems related to attacks on ciphers and hash functions, protocols, permutations, primality tests, etc. We discuss several open problems on JPEG encoding, Miller -- Rabin primality test, special bases in the vector space, AES-GCM. The problem of a modified Miller -- Rabin primality test was solved during the Olympiad. The problem for finding special bases was partially solved

    EHE: nonce misuse-resistant message authentication

    Get PDF
    We propose a nonce misuse-resistant message authentication scheme called EHE (Encrypt-Hash-Encrypt). In EHE, a message-dependent polynomial is evaluated at the point which is an encrypted nonce. The resulting polynomial hash value is encrypted again and becomes an authentication tag. We prove the prf-security of the EHE scheme and extend it to two authenticated encryption modes which follow the “encrypt-then-authenticate” paradigm

    On the Connection Between the Maximal Coefficients of the Fourier and Walsh–Hadamard Transforms

    Full text link
    Let the Fourier and Walsh–Hadamard transforms be applied to the same sequence. We obtain upper bounds for the maximal Fourier coefficient via the maximal Walsh–Hadamard coefficient

    Оценка сверху числа бент-функций с помощью 2-строчных бент-прямоугольников

    Full text link
    Using the representation of bent functions (maximum nonlinear functions) by bent rectangles, that is, special matrices with restrictions on columns and rows, we obtain herein an upper bound on the number of bent functions that improves the previously known bounds in a practical range of dimensions. The core of our method is the following fact based on the recent observation by V. Potapov (arXiv:2107.14583): a 2-row bent rectangle is completely determined by one of its rows and the remaining values in slightly more than half of the columns. С помощью представления бент-функций (максимально нелинейных функций) бент-прямоугольниками (специальными матрицами с ограничениями на строки и столбцы) получена оценка сверху для числа бент-функций, которая улучшает ранее известные оценки в практическом диапазоне размерностей. Используется следующий факт, основанный на недавнем наблюдении В. Потапова (arXiv:2107.14583): 2-строчный бент-прямоугольник полностью определяется одной из своих строк и оставшимися значениями в немногим более половине столбцов.

    Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography

    Full text link
    The mathematical problems, presented at the Third International Students’ Olympiad in Cryptography NSUCRYPTO’2016, and their solutions are considered. They are related to the construction of algebraic immune vectorial Boolean functions and big Fermat numbers, the secrete sharing schemes and pseudorandom binary sequences, biometric cryptosystems and the blockchain technology, etc. Two open problems in mathematical cryptography are also discussed and a solution for one of them proposed by a participant during the Olympiad is described. It was the first time in the Olympiad history. The problem is the following: construct F : ^ with maximum possible component algebraic immunity 3 or prove that it does not exist. Alexey Udovenko from University of Luxembourg has found such a function
    corecore