A Proof of P ! = NP: New Symmetric Encryption Algorithm Against Any Linear Attacks and Differential Attacks

被引:0
|
作者
Ming, Gao [1 ]
机构
[1] YingXiang Inc, Tianfu New Area, Sichuan, Peoples R China
关键词
P vs NP; One-Way Function; Linear Attacks; Differential Attacks; CRYPTANALYSIS;
D O I
10.1007/978-3-031-28073-3_41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P vs NP problem is the most important unresolved problem in the field of computational complexity. Its impact has penetrated into all aspects of algorithm design, especially in the field of cryptography. The security of cryptographic algorithms based on short keys depends on whether P is equal to NP. Cryptography algorithms used in practice are all based on short key, and the security of the short key mechanism is ultimately based on "one-way" assumption, that is, it is assumed that a one-way function exists. In fact, the existence of one-way function can directly lead to the important conclusion P ! = NP. In this paper, we originally constructed a short-key block cipher algorithm. The core feature of this algorithm is that for any block, when a plaintext-ciphertext pair is known, any key in the key space can satisfy the plaintext-ciphertext pair, that is, for each block, the plaintext-ciphertext pair and the key are independent, and the independence between blocks is also easy to construct. This feature is completely different from all existing short-key cipher algorithms. Based on the above feature, we construct a problem and theoretically prove that the problem satisfies the properties of oneway functions, thereby solving the problem of the existence of one-way functions, that is, directly proving that P ! = NP.
引用
收藏
页码:589 / 601
页数:13
相关论文
共 36 条
  • [21] Analysis of zig-zag scan based modified feedback convolution algorithm against differential attacks and its application to image encryption
    Vidhya, R.
    Brindha, M.
    Gounden, N. Ammasai
    APPLIED INTELLIGENCE, 2020, 50 (10) : 3101 - 3124
  • [22] A new document classification algorithm against malicious data leakage attacks
    Kesenek, Yahya
    Ozcelik, Ibrahim
    Kaya, Fmrah
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2022, 37 (03): : 1639 - 1654
  • [23] A new robust video watermarking algorithm against cropping and rotating attacks
    Bahrami, Zhila
    Akhlaghian, Fardin
    2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 122 - 127
  • [24] A multi-shape hybrid symmetric encryption algorithm to thwart attacks based on the knowledge of the used cryptographic suite
    Altigani, Abdelrahman
    Hasan, Shafaatunnur
    Shamsuddin, Siti Mariyam
    Barry, Bazara
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 210 - 221
  • [25] Security of the Poseidon Hash Function Against Non-Binary Differential and Linear Attacks
    L. Kovalchuk
    R. Oliynykov
    M. Rodinko
    Cybernetics and Systems Analysis, 2021, 57 : 268 - 278
  • [26] Security of the Poseidon Hash Function Against Non-Binary Differential and Linear Attacks
    Kovalchuk, L.
    Oliynykov, R.
    Rodinko, M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2021, 57 (02) : 268 - 278
  • [27] Physical Layer Encryption Algorithm for Chaotic Optical OFDM Transmission against Chosen-Plaintext Attacks
    Yang, Xuelin
    Shen, Zanwei
    Hu, Xiaonan
    Hu, Weisheng
    2016 18TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS (ICTON), 2016,
  • [28] New Certificateless Public Key Encryption Secure Against Malicious KGC Attacks in the Standard Model
    Yang, Wenjie
    Weng, Jian
    Zhang, Futai
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 236 - 247
  • [29] Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks
    Santoso, Bagus
    Oohama, Yasutada
    Su, Chunhua
    NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 3 - 17
  • [30] A New Security Games Based Reaction Algorithm Against DOS Attacks in VANETs
    Mejri, Mohamed Nidhal
    Achir, Nadjib
    Hamdi, Mohamed
    2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2016,