SlideShare une entreprise Scribd logo
1  sur  23
Stream ciphers based on the mathematical
structure underlying the 3 body problem.
Author : Samir Bouftass , Independant crypto researcher
E-mail : crypticator@gmail.com
Stream cipher ?
1 - Key Stream Generation :
2 - Encryption :
3 – Decryption :
A KeyStream K should fulfill this condition :
The three body problem :
If we perform measurements after a time intervall T :
A modélisation of three body problem could be useful to crypto
algorithmes design.
A General Stream cipher algorithm :
Input Data :
Secret Key : Sk.
Plain Text : M = [ m_0….m_n] .
Intermediate Data :
Internal State : S = [s_0…..s_n] .
KeyStream : K = [k_0….k_n].
Output Data :
Cipher Text : C = [c_0…..c_n] .
State Initialization :
s_0 = Initialize( Sk ).
Encryption/Decryption loop :
For i = 0 to n do
s_(i+1) = F ( s_i )
k_i = G ( s_(i+1) )
c_i = k_i xor p_i
The mathematical structure underlying the three body problem.
The mathematical structure :
Set S ={ [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] …
[(p1_i,f1_i),(p2_i,f2_i),(p3_i,f3_i)] …
[(p1_n,f1_n),(p2_n,f2_n),(pi_n,fi_n)] }
Caracterized by following rules :
f1_i+1 = F1(p2_i , p3_i )
f2_i+1 = F2(p3_i , p1_i )
f3_i+1 = F3(p1_i , p2_i )
p1_i+1 = G1(f1_i+1 )
p2_i+1 = G2(f2_i+1 )
p3_i+1 = G3(f3_i+1 )
A General Stream cipher algorithm based on the mathematical
structure underlying the three body problem :
Input Data :
Secret Key : Sk.
Plain Text : M = [ m_0….m_n] .
Intermediate Data :
Internal State : S = { [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] …..
[(p1_n,f1_n),(p2_n,f2_n),(p3_n,f3_n)] }
Key Stream : K = [k_0….k_n].
Output Data :
Cipher Text: C = [c_0…..c_n].
State Initialization :
s_0 =[(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] = Initialize(Cs ).
Encryption/Decryption loop :
For i = 0 to n do
f1_i+1 = F1(p2_i , p3_i )
f2_i+1 = F2(p3_i , p1_i )
f3_i+1 = F3(p1_i , p2_i )
p1_i+1 = G1(f1_i+1 )
p2_i+1 = G2(f2_i+1 )
p3_i+1 = G3(f3_i+1 )
k_i = p1_i+1
c_i = k_i xor m_i
3XRC4 : A RC4 variant based on the mathematical structure
underlying The 3 body problème .
RC4 Algorithm:
Secret key Sk, a componed of L bytes : K[0], …, K[L-1].
Initialization :
for i : 0 to 255
S[i] : i.
j : 0
for i : 0 to 255
j : ( j + S[i] + K[i mod L ] ) mod 256
swap S[i] and S[j]
Encryption / Decryption Loop :
i : 0 , j : 0
for i : 0 to n
i : ( i+1 ) mod 256
j : ( j+S[i] ) mod 256
swap S[i] and S[j].
k_i+1 = S[( S[i] + S[j] ) mod 256 ]
c_i = k_i+1 xor m_i.
L’algorithme 3XRC4 :
Secret Key Sk =[K1, K2, K3] , Ki=1..3 a componed of L bytes : ki[0], …, ki[L-1].
Initialization :
for i : 0 to 255
S1[i] : S2[i] : S3[i] : i .
u : v : w : 0
for i : 0 to 255
u : ( u + S2[S3[i]] + K1[ i mod L ] ) mod 256
swap S1[i] and S1[u]
v : ( v + S3[S1[i]] + K2[ i mod L ] ) mod 256
swap S2[i] and S2[v]
w : ( w + S3[S1[i]] + K3[ i mod L ] ) mod 256
swap S3[i] and S3[v]
Encryption / Decryption Loop :
i : u : v : w :0
for i = 0 to n
i : ( i+1 ) mod 256
u : ( u+S2[S3[i]] ) mod 256
swap S1[i] and S1[u]
v : ( v+S3[S1[i]] ) mod 256
swap S2[i] and S2[v]
w : ( w+S1[S2[i]] ) mod 256
swap S3[i] and S3[w]
k_i+1 = S2[S3[( S1[i] + S1[u] ) mod 256 ]]
c_i = k_i+1 xor m_i.

Contenu connexe

Tendances

Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3SangramNavale
 
Presentation - MA181 - Final
Presentation - MA181 - FinalPresentation - MA181 - Final
Presentation - MA181 - FinalAbraham Bedada
 
Calculus 1
Calculus 1Calculus 1
Calculus 1hosiduy
 
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionImplementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionMd. Ariful Hoque
 
Cohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithmCohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithmShilpa Hait
 
Cyrus beck line clipping algorithm
Cyrus beck line clipping algorithmCyrus beck line clipping algorithm
Cyrus beck line clipping algorithmPooja Dixit
 
4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Formsahutchins74
 
what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)budi rahardjo
 
CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)Hiroki Mizuno
 
Application of bases
Application of basesApplication of bases
Application of basesAbdur Rehman
 
C++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPAC++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPAIsabella789
 

Tendances (20)

Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3
 
Special factor patterns
Special factor patternsSpecial factor patterns
Special factor patterns
 
Presentation - MA181 - Final
Presentation - MA181 - FinalPresentation - MA181 - Final
Presentation - MA181 - Final
 
Calculus 1
Calculus 1Calculus 1
Calculus 1
 
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionImplementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
 
Ellipse
EllipseEllipse
Ellipse
 
Slides to RSA Presentation
Slides to RSA PresentationSlides to RSA Presentation
Slides to RSA Presentation
 
Review version 4
Review version 4Review version 4
Review version 4
 
Sol71
Sol71Sol71
Sol71
 
Review version 2
Review version 2Review version 2
Review version 2
 
Cohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithmCohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithm
 
Review
ReviewReview
Review
 
Cyrus beck line clipping algorithm
Cyrus beck line clipping algorithmCyrus beck line clipping algorithm
Cyrus beck line clipping algorithm
 
4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form
 
Fast and Easy Subnetting
Fast and Easy SubnettingFast and Easy Subnetting
Fast and Easy Subnetting
 
what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)
 
Review version 3
Review version 3Review version 3
Review version 3
 
CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)
 
Application of bases
Application of basesApplication of bases
Application of bases
 
C++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPAC++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPA
 

Similaire à 3XRC4

Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes acijjournal
 
Cn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshanCn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshanriturajj
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and CryptographyTalha SAVAS
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainFerdin Joe John Joseph PhD
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentationSoham Mondal
 
RSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENESRSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENESacijjournal
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaSoham Mondal
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Saif Kassim
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docxwellesleyterresa
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
Basics of Cryptography
Basics of CryptographyBasics of Cryptography
Basics of CryptographySunil Kumar
 
Chapter Eight(2)
Chapter Eight(2)Chapter Eight(2)
Chapter Eight(2)bolovv
 
i need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdfi need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdfshreeaadithyaacellso
 

Similaire à 3XRC4 (20)

WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
 
Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes
 
Cn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshanCn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshan
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
RSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENESRSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENES
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
Wepwhacker !
Wepwhacker !Wepwhacker !
Wepwhacker !
 
Asssignment2
Asssignment2 Asssignment2
Asssignment2
 
15
1515
15
 
15
1515
15
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Basics of Cryptography
Basics of CryptographyBasics of Cryptography
Basics of Cryptography
 
Chapter Eight(2)
Chapter Eight(2)Chapter Eight(2)
Chapter Eight(2)
 
NCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based EncryptionNCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based Encryption
 
i need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdfi need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdf
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 

Dernier (20)

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

3XRC4

  • 1. Stream ciphers based on the mathematical structure underlying the 3 body problem.
  • 2. Author : Samir Bouftass , Independant crypto researcher E-mail : crypticator@gmail.com
  • 4. 1 - Key Stream Generation :
  • 7. A KeyStream K should fulfill this condition :
  • 8. The three body problem :
  • 9. If we perform measurements after a time intervall T :
  • 10. A modélisation of three body problem could be useful to crypto algorithmes design.
  • 11. A General Stream cipher algorithm : Input Data : Secret Key : Sk. Plain Text : M = [ m_0….m_n] . Intermediate Data : Internal State : S = [s_0…..s_n] . KeyStream : K = [k_0….k_n]. Output Data : Cipher Text : C = [c_0…..c_n] .
  • 12. State Initialization : s_0 = Initialize( Sk ). Encryption/Decryption loop : For i = 0 to n do s_(i+1) = F ( s_i ) k_i = G ( s_(i+1) ) c_i = k_i xor p_i
  • 13. The mathematical structure underlying the three body problem.
  • 14. The mathematical structure : Set S ={ [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] … [(p1_i,f1_i),(p2_i,f2_i),(p3_i,f3_i)] … [(p1_n,f1_n),(p2_n,f2_n),(pi_n,fi_n)] } Caracterized by following rules : f1_i+1 = F1(p2_i , p3_i ) f2_i+1 = F2(p3_i , p1_i ) f3_i+1 = F3(p1_i , p2_i ) p1_i+1 = G1(f1_i+1 ) p2_i+1 = G2(f2_i+1 ) p3_i+1 = G3(f3_i+1 )
  • 15. A General Stream cipher algorithm based on the mathematical structure underlying the three body problem : Input Data : Secret Key : Sk. Plain Text : M = [ m_0….m_n] . Intermediate Data : Internal State : S = { [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] ….. [(p1_n,f1_n),(p2_n,f2_n),(p3_n,f3_n)] } Key Stream : K = [k_0….k_n]. Output Data : Cipher Text: C = [c_0…..c_n].
  • 16. State Initialization : s_0 =[(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] = Initialize(Cs ). Encryption/Decryption loop : For i = 0 to n do f1_i+1 = F1(p2_i , p3_i ) f2_i+1 = F2(p3_i , p1_i ) f3_i+1 = F3(p1_i , p2_i ) p1_i+1 = G1(f1_i+1 ) p2_i+1 = G2(f2_i+1 ) p3_i+1 = G3(f3_i+1 ) k_i = p1_i+1 c_i = k_i xor m_i
  • 17. 3XRC4 : A RC4 variant based on the mathematical structure underlying The 3 body problème .
  • 18. RC4 Algorithm: Secret key Sk, a componed of L bytes : K[0], …, K[L-1]. Initialization : for i : 0 to 255 S[i] : i. j : 0 for i : 0 to 255 j : ( j + S[i] + K[i mod L ] ) mod 256 swap S[i] and S[j]
  • 19. Encryption / Decryption Loop : i : 0 , j : 0 for i : 0 to n i : ( i+1 ) mod 256 j : ( j+S[i] ) mod 256 swap S[i] and S[j]. k_i+1 = S[( S[i] + S[j] ) mod 256 ] c_i = k_i+1 xor m_i.
  • 20.
  • 22. Secret Key Sk =[K1, K2, K3] , Ki=1..3 a componed of L bytes : ki[0], …, ki[L-1]. Initialization : for i : 0 to 255 S1[i] : S2[i] : S3[i] : i . u : v : w : 0 for i : 0 to 255 u : ( u + S2[S3[i]] + K1[ i mod L ] ) mod 256 swap S1[i] and S1[u] v : ( v + S3[S1[i]] + K2[ i mod L ] ) mod 256 swap S2[i] and S2[v] w : ( w + S3[S1[i]] + K3[ i mod L ] ) mod 256 swap S3[i] and S3[v]
  • 23. Encryption / Decryption Loop : i : u : v : w :0 for i = 0 to n i : ( i+1 ) mod 256 u : ( u+S2[S3[i]] ) mod 256 swap S1[i] and S1[u] v : ( v+S3[S1[i]] ) mod 256 swap S2[i] and S2[v] w : ( w+S1[S2[i]] ) mod 256 swap S3[i] and S3[w] k_i+1 = S2[S3[( S1[i] + S1[u] ) mod 256 ]] c_i = k_i+1 xor m_i.