Search results for "Plaintext"

showing 4 items of 4 documents

Cryptanalysis of Knapsack Cipher Using Ant Colony Optimization

2018

Ant Colony Optimization is a search metaheuristic inspired by the behavior of real ant colonies and shown their effectiveness, robustness to solve a wide variety of complex problems. In this paper, we present a novel Ant Colony Optimization (ACO) based attack for cryptanalysis of knapsack cipher algorithm. A Cipher-text only attack is used to discover the plaintext from the cipher-text. Moreover, our approach allows us to break knapsack cryptosystem in a minimum search space when compared with other techniques. Experimental results prove that ACO can be used as an effective tool to attack knapsack cipher.

Computer scienceAnt colony optimization algorithmsMathematicsofComputing_NUMERICALANALYSISMerkle–Hellman knapsack cryptosystemPlaintextData_CODINGANDINFORMATIONTHEORYAnt colonyComputingMethodologies_ARTIFICIALINTELLIGENCElaw.inventionKnapsack problemlawTheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITYCryptosystemCryptanalysisAlgorithmMetaheuristicSSRN Electronic Journal
researchProduct

Security of public key cryptosystems based on Chebyshev Polynomials

2004

Chebyshev polynomials have been recently proposed for designing public-key systems. Indeed, they enjoy some nice chaotic properties, which seem to be suitable for use in Cryptography. Moreover, they satisfy a semi-group property, which makes possible implementing a trapdoor mechanism. In this paper we study a public key cryptosystem based on such polynomials, which provides both encryption and digital signature. The cryptosystem works on real numbers and is quite efficient. Unfortunately, from our analysis it comes up that it is not secure. We describe an attack which permits to recover the corresponding plaintext from a given ciphertext. The same attack can be applied to produce forgeries …

FOS: Computer and information sciencesPlaintext-aware encryptionTheoretical computer scienceComputer Science - Cryptography and SecurityCramer–Shoup cryptosystemData_CODINGANDINFORMATIONTHEORYDeterministic encryptionHybrid cryptosystemCryptosystemElectrical and Electronic EngineeringSemantic securityThreshold cryptosystemCryptography and Security (cs.CR)Goldwasser–Micali cryptosystemMathematics
researchProduct

Improved Magic Ink Signatures Using Hints

1999

We introduce two improvements to the recently proposed so called magic ink DSS signatures. A first improvement is that we reduce the overhead for tracing without noticeably increasing any other cost. The tracing cost is linear in the number of generated signatures in the original proposal; our improved version reduces this to a logarithmic cost in the common case. A second improvement is that we introduce a method for determining whether forged currency is in circulation, without affecting the privacy of honest users. Our improvements rely on our introducing a so called hint value. This is an encryption of the signature transcript received, submitted by the signature receiver. Part of the p…

Public-key cryptographyTheoretical computer sciencebusiness.industryComputer scienceMagic (programming)PlaintextCryptographyEncryptionbusinessAlgorithmSecret sharing
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct