Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/4678
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chaudhari, Narendra S. | en_US |
dc.date.accessioned | 2022-03-17T01:00:00Z | - |
dc.date.accessioned | 2022-03-17T15:35:08Z | - |
dc.date.available | 2022-03-17T01:00:00Z | - |
dc.date.available | 2022-03-17T15:35:08Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Jain, A., & Chaudhari, N. S. (2015). Analysis of the improved knapsack cipher. Paper presented at the 2015 8th International Conference on Contemporary Computing, IC3 2015, 537-541. doi:10.1109/IC3.2015.7346740 | en_US |
dc.identifier.isbn | 9781467379489 | - |
dc.identifier.other | EID(2-s2.0-84969134782) | - |
dc.identifier.uri | https://doi.org/10.1109/IC3.2015.7346740 | - |
dc.identifier.uri | https://dspace.iiti.ac.in/handle/123456789/4678 | - |
dc.description.abstract | Computational complexity of order 256n to solve the knapsack cipher 0/255 (or improved knapsack cipher) recently suggested by Pham is optimistic result. In this paper, we systematically analyze the improved knapsack cipher in relation to the complexity claims. During the analysis of the improved knapsack cipher, we examined that the public key size must be large to satisfy the constraint of complexity. Though we chose keys of large sizes, the improved knapsack cipher is not safe and its security is compromised by lattice-based attacks. Furthermore, the cipher lost its practicality, since the use of large size public keys. Hence, we identify a construction of practical knapsack cipher 0/f, characterize its requirements and demonstrate asymptotically, that the computational complexity of the knapsack cipher 0/f and knapsack cipher 0/1 (basic or sum-of-subset cipher) is equal. It is worth pointing out that the proposed knapsack cipher 0/f is a compact and viable option to use as a building block for security purpose in resource-constrained devices such as RFID tags, smart cards and the like. © 2015 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
dc.source | 2015 8th International Conference on Contemporary Computing, IC3 2015 | en_US |
dc.subject | Computational complexity | en_US |
dc.subject | Radio frequency identification (RFID) | en_US |
dc.subject | Security of data | en_US |
dc.subject | Smart cards | en_US |
dc.subject | Building blockes | en_US |
dc.subject | Cryptology | en_US |
dc.subject | Knapsack Cipher | en_US |
dc.subject | Lattice-based | en_US |
dc.subject | Public keys | en_US |
dc.subject | Resourceconstrained devices | en_US |
dc.subject | RF-ID tags | en_US |
dc.subject | Public key cryptography | en_US |
dc.title | Analysis of the improved knapsack cipher | en_US |
dc.type | Conference Paper | en_US |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: