Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Analysis on Aigis‐Enc: Asymmetrical and symmetrical

View through CrossRef
Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE). A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are { η 1 , η 2 } = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made. In particular, the authors ascertain that the CPA security of Aigis‐Enc is 160.895, and that of the symmetrical LWE encryption scheme on the same scale is 161.834. The ratio of computation complexity on the sampling amount of the former and the latter is 5:4 in the key generation phase and 19:14 in the encryption phase. The decryption failure probability of the former is 2 −128.699 and that of the latter is 2 −67.0582 , then the authors show how to reduce the decryption failure probability of the latter significantly by increasing some traffic. Furthermore, those attacks presented by designers of Aigis‐Enc, including primal attacks and dual attacks are generalised. Our attacks are more extensive, simpler, and clearer. With them, the optimal attacks and the ‘optimal‐optimal attacks’ on Aigis‐Enc and the symmetrical LWE scheme on the same scale are obtained.
Institution of Engineering and Technology (IET)
Title: Analysis on Aigis‐Enc: Asymmetrical and symmetrical
Description:
Abstract Aigis‐Enc is an encryption algorithm based on asymmetrical learning with errors (LWE).
A thorough comparison between Aigis‐Enc (with the recommended parameters) and a symmetrical LWE encryption scheme on the same scale (the sampling parameters are { η 1 , η 2 } = {2, 2} instead of {1, 4}) on Chosen‐plaintext attack (CPA) security, computation complexity and decryption failure probability is made.
In particular, the authors ascertain that the CPA security of Aigis‐Enc is 160.
895, and that of the symmetrical LWE encryption scheme on the same scale is 161.
834.
The ratio of computation complexity on the sampling amount of the former and the latter is 5:4 in the key generation phase and 19:14 in the encryption phase.
The decryption failure probability of the former is 2 −128.
699 and that of the latter is 2 −67.
0582 , then the authors show how to reduce the decryption failure probability of the latter significantly by increasing some traffic.
Furthermore, those attacks presented by designers of Aigis‐Enc, including primal attacks and dual attacks are generalised.
Our attacks are more extensive, simpler, and clearer.
With them, the optimal attacks and the ‘optimal‐optimal attacks’ on Aigis‐Enc and the symmetrical LWE scheme on the same scale are obtained.

Related Results

Pembuatan Port ENC di Tanjung Priok
Pembuatan Port ENC di Tanjung Priok
Electronic Navigational Charts (ENC) adalah suatu peta vektor yang dikompilasi dari sebuah basis data objek individual yang tergeoreferensi berdasarkan pada standar transfer data S...
S-57 COMPOSER
S-57 COMPOSER
Menurut konvensi Safety of Life at Sea (SOLAS), semua kapal harus memiliki Electronic Navigation Chart (ENC) dengan menggunakan Electronic Chart Display and Information System (ECD...
Remote Facilitation of Essential Newborn Care: A Multinational, Multicenter Pilot Study
Remote Facilitation of Essential Newborn Care: A Multinational, Multicenter Pilot Study
BACKGROUND AND OBJECTIVES Essential Newborn Care (ENC) training improves neonatal outcomes, particularly in low-resource settings. The American Academy of Pedia...
Evaluation of Antiasthmatic Activity of Eraippu Noi Chooranam (ENC)
Evaluation of Antiasthmatic Activity of Eraippu Noi Chooranam (ENC)
Background: Every human race has its own traditional system of medicines. Siddha system of medicine is unique and ancient of its kind originating from Tamil Nadu in India. Siddha s...
The Finnish exclusive-negative construction ei…ku(i)n in the network of exclusion expressions
The Finnish exclusive-negative construction ei…ku(i)n in the network of exclusion expressions
Abstract. This paper shows that Finnish has the option of expressing ‘only’-like exclusive meaning with a clausal construction, here called the Exclusive-Negative Construction, ENC...
Education of nurses in rural primary health cares to improve vital care of newborns: A community-based research in Nigeria
Education of nurses in rural primary health cares to improve vital care of newborns: A community-based research in Nigeria
This study was designed to ascertain the level of knowledge and the degree of practice of the components of Essential New-born care (ENC), and the effects of a training programme o...
Asymmetric decentralisation arrangements in the implementation of regional autonomy in Indonesia
Asymmetric decentralisation arrangements in the implementation of regional autonomy in Indonesia
This research aims: 1) to find, review, and analyze the importance of asymmetrical decentralization in the implementation of regional autonomy; 2) to find, review, and analyze the ...
The Collective Mind: An Experimental Analysis of Imitation and Self‑organization in Humans
The Collective Mind: An Experimental Analysis of Imitation and Self‑organization in Humans
I present an experimental paradigm to explore the interpersonal dynamics generating a collective mind. I hypothesized that collective organization is based on dual interpersonal mo...

Back to Top