A Proof of P ! = NP: New Symmetric Encryption Algorithm Against Any Linear Attacks and Differential Attacks

被引:0
|
作者
Ming, Gao [1 ]
机构
[1] YingXiang Inc, Tianfu New Area, Sichuan, Peoples R China
关键词
P vs NP; One-Way Function; Linear Attacks; Differential Attacks; CRYPTANALYSIS;
D O I
10.1007/978-3-031-28073-3_41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P vs NP problem is the most important unresolved problem in the field of computational complexity. Its impact has penetrated into all aspects of algorithm design, especially in the field of cryptography. The security of cryptographic algorithms based on short keys depends on whether P is equal to NP. Cryptography algorithms used in practice are all based on short key, and the security of the short key mechanism is ultimately based on "one-way" assumption, that is, it is assumed that a one-way function exists. In fact, the existence of one-way function can directly lead to the important conclusion P ! = NP. In this paper, we originally constructed a short-key block cipher algorithm. The core feature of this algorithm is that for any block, when a plaintext-ciphertext pair is known, any key in the key space can satisfy the plaintext-ciphertext pair, that is, for each block, the plaintext-ciphertext pair and the key are independent, and the independence between blocks is also easy to construct. This feature is completely different from all existing short-key cipher algorithms. Based on the above feature, we construct a problem and theoretically prove that the problem satisfies the properties of oneway functions, thereby solving the problem of the existence of one-way functions, that is, directly proving that P ! = NP.
引用
收藏
页码:589 / 601
页数:13
相关论文
共 36 条
  • [31] Vulnerability of Advanced Encryption Standard algorithm to Differential Power Analysis attacks implemented on ATmega-128 microcontroller
    Mpalane, Kealeboga
    Gasela, Naison
    Esiefarienrhe, B. M.
    Tsague, H. D.
    2016 THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND PATTERN RECOGNITION (AIPR), 2016,
  • [32] New Attacks against Transformation-Based Privacy-Preserving Linear Programming
    Laud, Peeter
    Pankova, Alisa
    SECURITY AND TRUST MANAGEMENT, STM 2013, 2013, 8203 : 17 - 32
  • [33] On the Performance of Non-Profiled Differential Deep Learning Attacks against an AES Encryption Algorithm Protected using a Correlated Noise Generation based Hiding Countermeasure
    Alipour, Amir
    Papadimitriou, Athanasios
    Beroulle, Vincent
    Aerabi, Ehsan
    Hely, David
    PROCEEDINGS OF THE 2020 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2020), 2020, : 614 - 617
  • [34] Differential privacy distributed optimization algorithm against adversarial attacks for efficiency optimization of complex industrial processes
    Yue, Changyang
    Du, Wenli
    Li, Zhongmei
    Liu, Bing
    Nie, Rong
    Qian, Feng
    ADVANCED ENGINEERING INFORMATICS, 2024, 62
  • [35] A New Differential Scan-Based Side-Channel Attacks Against RSA Cryptosystem
    Dalvadi, Darshna
    Kothari, Badal
    Shah, Keyur
    PROCEEDINGS OF INTERNATIONAL CONFERENCE ON ICT FOR SUSTAINABLE DEVELOPMENT ICT4SD 2015, VOL 2, 2016, 409 : 133 - 141
  • [36] Distributed Algorithm for Constrained Social Cost Minimization Problem of Heterogeneous Linear Multiagent Systems Against DoS Attacks
    Nian, Xiaohong
    Li, Fan
    Liu, Dongxin
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (04): : 2101 - 2113