Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3136825.3136898acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

The duality principle in the theory of development generalized A-M knapsack cryptosystems

Published: 13 October 2017 Publication History

Abstract

We propose a method that extends the class of non-standard knapsack cryptosystem based on the principle of duality and provide a mechanism for such expansion on the example of super generalized additive knapsack problem. The generalized A-M knapsack is studied for the first time. The information protection system, based on the knapsack, can be developed both for additive and multiplicative knapsack. The necessary conditions under which a generalized A-M knapsack is dense and injective over Galois field GF(p) are established.

References

[1]
Shannon C. 1949. Communication theory of secrecy systems, Bell Syst Techn. J. 28, No. 4, 656--715.
[2]
W. Diffie, Hellman M. 1976. New directions in cryptography. IEEE Transactions on Information Theory. Vol. 22, 644--654.
[3]
Merkle R. Hellman M. 1978. Hiding information and signatures in knapsacks trapdoor. IEEE Transactions on Information Theory. Vol. IT-24, 525--530.
[4]
Chor B, Rivest R. 1988. A knapsack-type public key cryptosystem based on arithmetic in finite fields. IEEE Transactions on Information Theory. Vol. 34, No. 5, 901--909.
[5]
Shamir, A. 1984. A polynomial-time algorithm for breaking the basic Merkle-Hellman cryptosystem. IEEE Transactions on Information Theory. Vol. 30 No. 5, 699--704.
[6]
Lenstra Jr., H.W. 1983. Integer Programming with a Fixed Number of Variables. Mathematics of Operations Research. Vol. 8, No. 4, 538--548.
[7]
Koblitz, N. 1987. A Course in Number Theory and Cryptography. Springer-Verlag, New York.
[8]
Vaudenay S. 1998. Cryptanalysis of the Chor-Rivest cryptosystem. LNCS 1462, Proceedings of Crypto'98, Springer-Verlag, 243--256.
[9]
Salomaa, A. 1995. Public key cryptography. Springer-Verlag Berlin Heidelberg, New York.
[10]
Alferov A.P., Zubov A., Cheremushkin A.S., Kuzmin A.V. 2002. Basics of cryptography. Helios ARV, Moscow.
[11]
Osipyan V.O. 2003. On one generalization of knapsack cryptosystems. Izv. vuzov. Northern-Caucasus area. Tech. science, Appendix No. 5, 18--25.
[12]
Osipyan V.O., Osipyan K.V. 2004. Cryptography in exercises and tasks. Helios ARV, Moscow.
[13]
Osipyan V.O. 2004. Information protection systems based on functional knapsack problem. Voprosi zachiti informatsi. No. 4, 16--19.
[14]
Osipyan V.O. 2006. On Information Protection System Based on the nonstandard Knapsack Problem. Izv. vuzov. Tomsk Polytechnical University. V. 309, No2, 209--212.
[15]
Osipyan V.O. 2007. Generalization of open key knapsack cryptosystems. Security of Information and Networks: Proceedings of the First International Conference on Security of Information and Networks (SIN'2007). Trafford, 58--63.
[16]
Osipyan V.O., Arutyunyan A.S., Spirina S.G. 2010. Modeling knapsack cryptosystems containing Diophantine difficulty. Chebyshev collection. T. XI, ed. 1, 209--217.
[17]
Osipyan V.O. 2011. Different models of information protection system, based on the functional knapsack. In Proceedings of the 4th international conference on Security of information and networks (SIN'11), ACM Press, New York, NY, 215--218.
[18]
Osipyan V.O. 2012. Modeling information protection systems containing Diophantine difficulties. Development of methods for multistage systems solutions of Diophantine equations. Development of nonstandard knapsack cryptosystems. LAP Lambert Academic Publishing.
[19]
Osipyan V.O. 2012. Building of alphabetic data protection cryptosystems on the base of equal power with knapsacks Diophantine problems. In Proceedings of the 5th International Conference on Security of Information and Networks (SIN'12), ACM Press, New York, NY, 124--129.
[20]
Osipyan V.O., Karpenko Yu.A., Zhuk A. S., Harutyunyan A. H. 2013. Diophantine difficulties attacks on non-standard back packs information protection systems. Izvestiya SFU. SCI, No. 12, 209--215.
[21]
Osipyan V. O. 2013. Information protection systems based on universal knapsack problem. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN'13), ACM Press, New York, NY, 343--346.
[22]
Osipyan V. O., Zhuck A. S., Arutyunyan, A. H., Karpenko Y. A. 2013. Building of mathematical model of flow data processing system based on given the selection of elements of the set. In Proceedings of the 6th International Conference on Security of Information and Networks (SIN'13), ACM Press, New York, NY, 417--420.
[23]
Osipyan V.O. 2014. Mathematical model of the polyalphabetic information security system based on the generalized normal knapsack. In Proceedings of the 7th International Conference on Security of Information and Networks (SIN'14), ACM Press, New York, NY, 123--128.
[24]
Osipyan V.O. 2015. Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method. In Proceedings of the 8th International Conference on Security of Information and Networks (SIN' 15), ACM Press, New York, NY, 338--341.

Cited By

View all
  • (2021)NIST Testing of a Knapsack Symmetric Cryptosystem on Hamlin Codes Using Source Block Injections2021 Dynamics of Systems, Mechanisms and Machines (Dynamics)10.1109/Dynamics52735.2021.9653724(1-5)Online publication date: 9-Nov-2021

Index Terms

  1. The duality principle in the theory of development generalized A-M knapsack cryptosystems

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SIN '17: Proceedings of the 10th International Conference on Security of Information and Networks
    October 2017
    321 pages
    ISBN:9781450353038
    DOI:10.1145/3136825
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 October 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. additive
    2. cryptographic techniques
    3. dense
    4. duality principle
    5. injective knapsack
    6. mathematical model of alphabetic cryptosystem
    7. multiplicative super-generalized knapsack problem

    Qualifiers

    • Short-paper

    Conference

    SIN '17
    SIN '17: Security of Information and Networks
    October 13 - 15, 2017
    Jaipur, India

    Acceptance Rates

    Overall Acceptance Rate 102 of 289 submissions, 35%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)NIST Testing of a Knapsack Symmetric Cryptosystem on Hamlin Codes Using Source Block Injections2021 Dynamics of Systems, Mechanisms and Machines (Dynamics)10.1109/Dynamics52735.2021.9653724(1-5)Online publication date: 9-Nov-2021

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media