Splicing DNA Model for Unknown Stream Cipher Cryptanalysis

B. S. Yaseen
{"title":"Splicing DNA Model for Unknown Stream Cipher Cryptanalysis","authors":"B. S. Yaseen","doi":"10.1109/IT-ELA52201.2021.9773767","DOIUrl":null,"url":null,"abstract":"The stream cipher combines vary advantages, that make it widely used. Including its suitability for on line transmission devices, its strength, simplicity, as well as its suitability for hard ware. It's considered difficult to break, especially when it be strong and unknown details. As a result-oriented idea for unknown stream cipher cryptanalysis, it can be attacked if the generator is known through the generator's output that combined with the plain text sequence to produce the cipher text sequence. The summary of the idea is to convert the final cipher text sequence into a genetic bases sequence by adopting the transformation: cipher bit 0 is convert into A or T, and cipher bit 1 is convert into C or G, by regarding several possibilities for cipher text transformations, a population of double Deoxyribonucleic Acid (DNA) strands can be formed, this population is an introduction to the splicing model, which is based on the conduct of its processes on two types of statistics, linguistic statistics for resting the plain text generated each time from the model, and statistics for randomness to test the key sequence is accompanying this plain text. Time is a measure of the complexity of comparing the methods implemented to cryptanalyze such a cipher, the consumed time to reach (90–95) % from the solutions of a variety examples is fixed and according to the length of the processed block of the cipher text sequence, which is approximately (mO(n)) for M blocks. The aim of this work is the digital simulation of the biological capabilities, in the field of analyzing and attacking the OTP cipher.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IT-ELA52201.2021.9773767","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The stream cipher combines vary advantages, that make it widely used. Including its suitability for on line transmission devices, its strength, simplicity, as well as its suitability for hard ware. It's considered difficult to break, especially when it be strong and unknown details. As a result-oriented idea for unknown stream cipher cryptanalysis, it can be attacked if the generator is known through the generator's output that combined with the plain text sequence to produce the cipher text sequence. The summary of the idea is to convert the final cipher text sequence into a genetic bases sequence by adopting the transformation: cipher bit 0 is convert into A or T, and cipher bit 1 is convert into C or G, by regarding several possibilities for cipher text transformations, a population of double Deoxyribonucleic Acid (DNA) strands can be formed, this population is an introduction to the splicing model, which is based on the conduct of its processes on two types of statistics, linguistic statistics for resting the plain text generated each time from the model, and statistics for randomness to test the key sequence is accompanying this plain text. Time is a measure of the complexity of comparing the methods implemented to cryptanalyze such a cipher, the consumed time to reach (90–95) % from the solutions of a variety examples is fixed and according to the length of the processed block of the cipher text sequence, which is approximately (mO(n)) for M blocks. The aim of this work is the digital simulation of the biological capabilities, in the field of analyzing and attacking the OTP cipher.
未知流密码分析的剪接DNA模型
流密码结合了多种优点,得到了广泛的应用。包括它对在线传输设备的适用性,它的强度,简单性,以及它对硬件的适用性。它被认为很难打破,特别是当它是坚固和未知的细节。作为未知流密码密码分析的一种面向结果的思想,如果通过生成器的输出与纯文本序列相结合以产生密文序列而知道生成器,则可能受到攻击。其思想的总结是将最终密文序列转换为遗传碱基序列,采用以下变换:将密码位0转换为A或T,将密码位1转换为C或G,通过考虑密文转换的几种可能性,可以形成一个双脱氧核糖核酸(DNA)链的种群,该种群是对剪接模型的介绍,该模型基于两种类型的统计进行其过程,语言统计用于对每次从模型生成的明文进行静置;而用于测试密钥序列随机性的统计数据则伴随着此纯文本。时间是比较实现方法的复杂性的度量,以密码分析这样的密码,从各种示例的解决方案中达到(90-95)%所消耗的时间是固定的,并且根据密文序列的处理块的长度,大约为M块的(mO(n))。本工作的目的是在分析和攻击OTP密码领域对生物能力进行数字模拟。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信