A Proof of P ! = NP: New Symmetric Encryption Algorithm Against Any Linear Attacks and Differential Attacks

被引:0
|
作者
Ming, Gao [1 ]
机构
[1] YingXiang Inc, Tianfu New Area, Sichuan, Peoples R China
关键词
P vs NP; One-Way Function; Linear Attacks; Differential Attacks; CRYPTANALYSIS;
D O I
10.1007/978-3-031-28073-3_41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P vs NP problem is the most important unresolved problem in the field of computational complexity. Its impact has penetrated into all aspects of algorithm design, especially in the field of cryptography. The security of cryptographic algorithms based on short keys depends on whether P is equal to NP. Cryptography algorithms used in practice are all based on short key, and the security of the short key mechanism is ultimately based on "one-way" assumption, that is, it is assumed that a one-way function exists. In fact, the existence of one-way function can directly lead to the important conclusion P ! = NP. In this paper, we originally constructed a short-key block cipher algorithm. The core feature of this algorithm is that for any block, when a plaintext-ciphertext pair is known, any key in the key space can satisfy the plaintext-ciphertext pair, that is, for each block, the plaintext-ciphertext pair and the key are independent, and the independence between blocks is also easy to construct. This feature is completely different from all existing short-key cipher algorithms. Based on the above feature, we construct a problem and theoretically prove that the problem satisfies the properties of oneway functions, thereby solving the problem of the existence of one-way functions, that is, directly proving that P ! = NP.
引用
收藏
页码:589 / 601
页数:13
相关论文
共 36 条
  • [1] ALGORITHM SUBSTITUTION ATTACKS ON SYMMETRIC ENCRYPTION: A SURVEY
    Carnemolla, D.
    DI Raimondo, M.
    MATEMATICHE, 2024, 79 (02): : 477 - 503
  • [2] An approach for symmetric encryption against side channel attacks in provable security
    Li, Wei
    Gu, Dawu
    PROVABLE SECURITY, PROCEEDINGS, 2007, 4784 : 178 - +
  • [3] Optimal Linear Encryption Against Stealthy Attacks on Remote State Estimation
    Shang, Jun
    Chen, Maoyin
    Chen, Tongwen
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (08) : 3592 - 3607
  • [4] Differential-linear attacks against the stream cipher Phelix
    Wu, Hongjun
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 87 - +
  • [5] Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption
    Xu, Lei
    Zheng, Leqian
    Xu, Chengzhi
    Yuan, Xingliang
    Wang, Cong
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3003 - 3017
  • [6] Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
    Iftekhar Salam
    Wei-Chuen Yau
    Raphaël C.-W. Phan
    Josef Pieprzyk
    Journal of Cryptographic Engineering, 2023, 13 : 265 - 281
  • [7] Differential fault attacks on the lightweight authenticated encryption algorithm CLX-128
    Salam, Iftekhar
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    Pieprzyk, Josef
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 13 (03) : 265 - 281
  • [8] A Chaotic Image Encryption Algorithm Robust against Phase Space Reconstruction Attacks
    Oravec, Jakub
    Turan, Jan
    Ovsenik, L'ubos
    Huszanik, Tomas
    ACTA POLYTECHNICA HUNGARICA, 2019, 16 (03) : 37 - 57
  • [9] Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros
    Hou, Shiqi
    Wu, Baofeng
    Wang, Shichang
    Guo, Hao
    Lin, Dongdai
    COMPUTER JOURNAL, 2024, 67 (04): : 1483 - 1500
  • [10] SEAMS: A Symmetric Encryption Algorithm Modification System to Resist Power Based Side Channel Attacks
    Pathirana, K. P. A. P.
    Lankarathne, L. R. M. O.
    Hangawaththa, N. H. A. D. A.
    Abeywardena, K. Y.
    Kuruwitaarachchi, N.
    INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 965 - 976