Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property (Q2333818)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property |
scientific article |
Statements
Determining whether a given cryptographic function is a permutation of another given cryptographic function -- a problem in intellectual property (English)
0 references
13 November 2019
0 references
If a block cipher \(E(k,p)\) (key \(k \in {\{ 0,1\} ^{{l_k}}}\), plaintext \(p \in {\{ 0,1\} ^{{l_p}}}\), e.g. in AES \({l_p} = 128\), \({l_k} \in \{ 128,192,256\} \)) is transformed using permutations \({M_1}\), \({M_2}\), \({M_3}\) (of suitable size), then the transformed fraudulent function \(\hat E(k,p) = {M_3}E({M_1}k,{M_2}p)\) remains a block cipher and its security properties would be preserved. The encryption function can be expressed using polynomials over \(\{ 0,1\} \) and systems of polynomials for the original and transformed function will be equivalent. This allows to reduce the fraud detection problem to logical satisfiability problem which can be solved using standard off-the-shelf software packages.
0 references
algebraic cryptanalysis
0 references
block ciphers
0 references
circuit equivalence
0 references
intellectual property fraud detection
0 references
isomorphism of polynomials
0 references
logical satisfiability solvers
0 references
SAT-solvers
0 references
polynomials mod 2
0 references
0 references
0 references
0 references
0 references