Symmetric Encryption Scheme Based on Quasigroup Using Chained Mode of Operation
- URL: http://arxiv.org/abs/2408.04490v1
- Date: Thu, 8 Aug 2024 14:39:51 GMT
- Title: Symmetric Encryption Scheme Based on Quasigroup Using Chained Mode of Operation
- Authors: Satish Kumar, Harshdeep Singh, Indivar Gupta, Ashok Ji Gupta,
- Abstract summary: We propose a novel construction for a symmetric encryption scheme, referred as SEBQ.
We utilize concepts of chaining like mode of operation and present a block cipher with in-built properties.
- Score: 1.4249472316161877
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this paper, we propose a novel construction for a symmetric encryption scheme, referred as SEBQ which is based on the structure of quasigroup. We utilize concepts of chaining like mode of operation and present a block cipher with in-built properties. We prove that SEBQ shows resistance against chosen plaintext attack (CPA) and by applying unbalanced Feistel transformation [19], it achieves security against chosen ciphertext attacks (CCA). Subsequently, we conduct an assessment of the randomness of the proposed scheme by running the NIST test suite and we analyze the impact of the initial vector, secret key and plaintext on ciphertext through an avalanche effect analysis. We also compare the results with existing schemes based on quasigroups [11,46]. Moreover, we analyze the computational complexity in terms of number of operations needed for encryption and decryption process.
Related papers
- Parseval Convolution Operators and Neural Networks [16.78532039510369]
We first identify the Parseval convolution operators as the class of energy-preserving filterbanks.
We then present a constructive approach for the design/specification of such filterbanks via the chaining of elementary Parseval modules.
We demonstrate the usage of those tools with the design of a CNN-based algorithm for the iterative reconstruction of biomedical images.
arXiv Detail & Related papers (2024-08-19T13:31:16Z) - Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers [0.0]
An innovative strategy to enhance the security of symmetric substitution ciphers is presented.
It is implemented through the implementation of a randomized key matrix suitable for various file formats.
arXiv Detail & Related papers (2023-11-29T21:13:38Z) - Publicly-Verifiable Deletion via Target-Collapsing Functions [81.13800728941818]
We show that targetcollapsing enables publiclyverifiable deletion (PVD)
We build on this framework to obtain a variety of primitives supporting publiclyverifiable deletion from weak cryptographic assumptions.
arXiv Detail & Related papers (2023-03-15T15:00:20Z) - On efficient quantum block encoding of pseudo-differential operators [6.134067544403308]
Block encoding lies at the core of many existing quantum algorithms.
This paper presents a study of the block encoding of a rich family of dense operators: the pseudo-differential operators (PDOs)
arXiv Detail & Related papers (2023-01-21T07:18:57Z) - An approach to robust ICP initialization [77.45039118761837]
We propose an approach to initialize the Iterative Closest Point (ICP) algorithm to match unlabelled point clouds related by rigid transformations.
We derive bounds on the robustness of our approach to noise and numerical experiments confirm our theoretical findings.
arXiv Detail & Related papers (2022-12-10T16:27:25Z) - Equivariant Transduction through Invariant Alignment [71.45263447328374]
We introduce a novel group-equivariant architecture that incorporates a group-in hard alignment mechanism.
We find that our network's structure allows it to develop stronger equivariant properties than existing group-equivariant approaches.
We additionally find that it outperforms previous group-equivariant networks empirically on the SCAN task.
arXiv Detail & Related papers (2022-09-22T11:19:45Z) - On recovering block cipher secret keys in the cold boot attack setting [0.0]
We show how to implement the quantum component of our algorithm for several block ciphers such as AES, PRESENT and GIFT, and LowMC.
We show the feasibility of performing our hybrid attack on Picnic, a post-quantum signature algorithm being an alternate candidate in the NIST post-quantum standardization competition.
arXiv Detail & Related papers (2022-05-09T12:16:02Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - A black-box adversarial attack for poisoning clustering [78.19784577498031]
We propose a black-box adversarial attack for crafting adversarial samples to test the robustness of clustering algorithms.
We show that our attacks are transferable even against supervised algorithms such as SVMs, random forests, and neural networks.
arXiv Detail & Related papers (2020-09-09T18:19:31Z) - Selective Inference for Latent Block Models [50.83356836818667]
This study provides a selective inference method for latent block models.
We construct a statistical test on a set of row and column cluster memberships of a latent block model.
The proposed exact and approximated tests work effectively, compared to the naive test that did not take the selective bias into account.
arXiv Detail & Related papers (2020-05-27T10:44:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.