Cryptanalysis of A New Method of Cryptography using Laplace Transform Hyperbolic Functions
DOI:
https://doi.org/10.26713/cma.v8i2.708Keywords:
Laplace transform, Cryptography, Cryptanalysis, A general attack scenarioAbstract
Although Laplace Transform is a good application field in the design of cryptosystems, many encryption algorithm proposals become unsatisfactory for secure communication since cryptanalysis studies are not sufficient. One of the important factors resulting in poor proposals is the fact that security analysis of the proposed encryption algorithms is performed with only statistical tests and experimental results. In this study, a general attack scenario was given in order to conduct security analyses of Laplace Transform based cryptosystems. The application of proposed general attack scenario was shown on recently proposed Laplace Transform based encryption scheme.Downloads
References
D.S. Bodkhe and S.K. Panchal, Use of Sumudu transform in cryptography, Bulletin of the Marathwada Mathematical Society 16 (2) (2015), 1 – 6.
A.P. Hiwarekar, A new method of cryptography using Laplace transform, International Journal of Mathematical Archive 3 (3) (2012), 1193 – 1197.
A.P. Hiwarekar, A new method of cryptography using Laplace transform of Hyperbolic functions, International Journal of Mathematical Archive 4 (2) (2013), 208 – 213.
G. Naga Lakshmi, B. Ravi Kumar and A. Chandra Sekhar, A cryptographic scheme of Laplace transforms, International Journal of Mathematical Archive 2 (12) (2011), 2515 – 2519.
M.T. Gençoğlu, Use of integral transform in cryptology, Science and Eng. J of Fırat Univ. 28 (2) (2016), 217 – 220.
C. Li and K.-T. Lo, Optimal quantitative cryptanalysis of permutation–only multimedia ciphers against plaintext attacks, Signal Processing 91 (2011), 949 – 954.
X. Ge, F. Liu, B. Lu and C. Yang, Improvement of Rhoumasattacks on Gaoalgorithm, Physics Letters A 374 (2010), 1362 – 1367.
M. Safkhani, P. Lopez, J. Hernandez-Castroc and N. Bagheri, Cryptanalysis of the Cho et al. protocol: A hash-based RFID tag mutual authentication protocol, Journal of Computational and Applied Mathematics 259 (2014), 571 – 577.
E.B. Kavun, E. Tischhauser and T. Yalçın, Large-scale high-resolution computational validation of novel complexity models in linear cryptanalysis Andrey-Bogdanov, Journal of Computational and
Applied Mathematics 259 (2014), 592 – 598.
M.T. Sakallı and B. Aslan, On the algebraic construction of cryptographically good (32times 32) binary linear transformations, Journal of Computational and Applied Mathematics 259 (2014), 485 – 494.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.