Symmetric Encryption Algorithms in a Polynomial Residue Number System

被引:0
|
作者
Yakymenko, I. [1 ]
Karpinski, M. [2 ,3 ]
Shevchuk, R. [4 ,5 ]
Kasianchuk, M. [1 ]
机构
[1] West Ukrainian Natl Univ, Dept Cyber Secur, UA-46009 Ternopol, Ukraine
[2] Ternopil Ivan Puluj Natl Tech Univ, Dept Cyber Secur, UA-46001 Ternopol, Ukraine
[3] Univ Natl Educ Commiss, Inst Secur & Comp Sci, PL-30084 Krakow, Poland
[4] West Ukrainian Natl Univ, Dept Comp Sci, UA-46009 Ternopol, Ukraine
[5] Univ Bielsko Biala, Dept Comp Sci & Automat, PL-43309 Bielsko Biala, Poland
关键词
ciphertext; cryptanalysis; cryptoalgorithm; cryptographic strength; residue number system; symmetric cryptosystem; ARCHITECTURES; OPERATIONS;
D O I
10.1155/2024/4894415
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, we develop the theoretical provisions of symmetric cryptographic algorithms based on the polynomial residue number system for the first time. The main feature of the proposed approach is that when reconstructing the polynomial based on the method of undetermined coefficients, multiplication is performed not on the found base numbers but on arbitrarily selected polynomials. The latter, together with pairwise coprime residues of the residue class system, serve as the keys of the cryptographic algorithm. Schemes and examples of the implementation of the developed polynomial symmetric encryption algorithm are presented. The analytical expressions of the cryptographic strength estimation are constructed, and their graphical dependence on the number of modules and polynomial powers is presented. Our studies show that the cryptanalysis of the proposed algorithm requires combinatorial complexity, which leads to an NP-complete problem.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] Incremental symmetric puncturable encryption with support for unbounded number of punctures
    Shi-Feng Sun
    Ron Steinfeld
    Amin Sakzad
    Designs, Codes and Cryptography, 2023, 91 : 1401 - 1426
  • [42] Efficient Neuroimaging Data Security and Encryption Using Pixel-Based Homomorphic Residue Number System
    Usman L.O.
    Muniyandi R.C.
    Usman M.A.
    SN Computer Science, 4 (6)
  • [43] Incremental symmetric puncturable encryption with support for unbounded number of punctures
    Sun, Shi-Feng
    Steinfeld, Ron
    Sakzad, Amin
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 91 (4) : 1401 - 1426
  • [44] Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
    Zhang, Xing
    Zheng, Yanpeng
    Jiang, Zhaolin
    Byun, Heejung
    JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2023, 69 (02) : 1967 - 1987
  • [45] Numerical algorithms for corner-modified symmetric Toeplitz linear system with applications to image encryption and decryption
    Xing Zhang
    Yanpeng Zheng
    Zhaolin Jiang
    Heejung Byun
    Journal of Applied Mathematics and Computing, 2023, 69 : 1967 - 1987
  • [46] RESIDUE NUMBER SYSTEM IMPLEMENTATIONS OF NUMBER THEORETIC TRANSFORMS IN COMPLEX RESIDUE RINGS
    BARANIECKA, AZ
    JULLIEN, GA
    IEEE TRANSACTIONS ON ACOUSTICS SPEECH AND SIGNAL PROCESSING, 1980, 28 (03): : 285 - 291
  • [47] The multipolynomial channel polynomial residue arithmetic system
    Abdallah, M
    Skavantzos, A
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 1999, 46 (02) : 165 - 171
  • [48] Encryption System with Variable Number of Registers
    Kanso, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2010, 36 (01) : 199 - 212
  • [49] New Residue Arithmetic Based Barrett Algorithms: Modular Polynomial Computations
    Garg, Hari Krishna
    Xiao, Hanshen
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 1178 - 1182
  • [50] Digital Watermarking Image Compression Method Based on Symmetric Encryption Algorithms
    Tan, Yanli
    Zhao, Yongqiang
    SYMMETRY-BASEL, 2019, 11 (12):