{"title":"两个树奇偶校验机的同步","authors":"Martin Javurek, M. Turčaník","doi":"10.1109/NTSP.2016.7747782","DOIUrl":null,"url":null,"abstract":"One of the problems of cryptography based on the tree parity machine is how to recognize that two tree parity machines are synchronized. In this paper, one of the possible solutions based on polynomial function is described. The proposed method is focused on obtaining of one unique number by polynomial function. Consequently, two possible forms of an attack on the number are presented. The first one is based on brute force attack and the second is done by using genetic algorithm.","PeriodicalId":232837,"journal":{"name":"2016 New Trends in Signal Processing (NTSP)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Synchronization of two tree parity machines\",\"authors\":\"Martin Javurek, M. Turčaník\",\"doi\":\"10.1109/NTSP.2016.7747782\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the problems of cryptography based on the tree parity machine is how to recognize that two tree parity machines are synchronized. In this paper, one of the possible solutions based on polynomial function is described. The proposed method is focused on obtaining of one unique number by polynomial function. Consequently, two possible forms of an attack on the number are presented. The first one is based on brute force attack and the second is done by using genetic algorithm.\",\"PeriodicalId\":232837,\"journal\":{\"name\":\"2016 New Trends in Signal Processing (NTSP)\",\"volume\":\"39 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 New Trends in Signal Processing (NTSP)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NTSP.2016.7747782\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 New Trends in Signal Processing (NTSP)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTSP.2016.7747782","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
One of the problems of cryptography based on the tree parity machine is how to recognize that two tree parity machines are synchronized. In this paper, one of the possible solutions based on polynomial function is described. The proposed method is focused on obtaining of one unique number by polynomial function. Consequently, two possible forms of an attack on the number are presented. The first one is based on brute force attack and the second is done by using genetic algorithm.