2017
DOI: 10.1007/978-3-319-70700-6_15
|View full text |Cite
|
Sign up to set email alerts
|

Symmetrically and Asymmetrically Hard Cryptography

Abstract: The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memory complexity. For a variety of reasons, many algorithms have been proposed that, instead of optimizing, try to increase one of these hardness forms.We present for the first time a unified framework for describing the hardness of a primitive along any of these three axes: code-hardness, timehardness and memory-hardness. This unified view allows us to present modular block cipher and sponge constructions which can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(28 citation statements)
references
References 26 publications
0
28
0
Order By: Relevance
“…Thus, we design a moderately hard approach to offer the trapdoor to provers. Precisely, with the unified framework of hard cryptographic primitives by Biryukov and Perrin [7], we can ask provers to evaluate a hard function before obtaining the trapdoor. The unified framework brings us even more advantages since the definition has three axes: time, memory, and code.…”
Section: B Our Approach and Contributionmentioning
confidence: 99%
“…Thus, we design a moderately hard approach to offer the trapdoor to provers. Precisely, with the unified framework of hard cryptographic primitives by Biryukov and Perrin [7], we can ask provers to evaluate a hard function before obtaining the trapdoor. The unified framework brings us even more advantages since the definition has three axes: time, memory, and code.…”
Section: B Our Approach and Contributionmentioning
confidence: 99%
“…For everyday Internet communications, generic cryptographic protocols, such as TLS and HTTPs [47], ensure that the communication between the two parties (sender and receiver) are authentic and private. Certain encryption algorithms that underpin these protocols, such as RSA [48,49], Diffie-Hellman [50,51], and elliptic curve [52][53][54], all are based on hard-to-solve mathematical problems and are categorized as asymmetric cryptographic primitives [55]. The time and resources needed to address these issues are prohibitive, which ensures that data encrypted using current encryption algorithms is considered secure.…”
Section: Lattice-based Cryptographymentioning
confidence: 99%
“…The hardness of these algorithms lies in their mathematical operations that are difficult to solve. All the aforementioned algorithms are termed asymmetric cryptographic primitives [96]. The solutions to these modern algorithms require enormous computational resources and time; therefore, they are highly secure algorithms if they have quantum computers to solve their existing asymmetric cryptographic primitives [97,98].…”
Section: ) Lattice-based Cryptographymentioning
confidence: 99%