Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2018. № 40. DOI: 10.17223/20710410/40/4

The mathematical problems, presented at the Third International Students' Olympiad in Cryptography NSUCRYPTO'2016, and their solutions are considered. They are related to the construction of algebraic immune vectorial Boolean functions and big Fermat numbers, the secrete sharing schemes and pseudorandom binary sequences, biometric cryptosystems and the blockchain technology, etc. Two open problems in mathematical cryptography are also discussed and a solution for one of them proposed by a participant during the Olympiad is described. It was the first time in the Olympiad history. The problem is the following: construct F : Fg -> Fg with maximum possible component algebraic immunity 3 or prove that it does not exist. Alexey Udovenko from University of Luxembourg has found such a function.
Download file
Counter downloads: 224
  • Title Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography
  • Headline Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography
  • Publesher Tomask State UniversityTomsk State University
  • Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 40
  • Date:
  • DOI 10.17223/20710410/40/4
Keywords
NSUCRYPTO, олимпиада, блокчейн, биометрия, булевы функции, шифры, криптография, NSUCRYPTO, Olympiad, blockchain, biometry, Boolean functions, ciphers, cryptography
Authors
References
Carlet C. On the algebraic immunities and higher order nonlinearities of vectorial Boolean Functions. Proc. NATO Advanced Research Workshop ACPTECC, Veliko Tarnovo, Bulgaria, October 6-9, 2008, Amsterdam, IOS Press, 2009, pp. 104-116.
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. 2009. Available at https:// bitcoin.org/bitcoin.pdf
Daemen J. and Rijmen V. The Design of Rijndael: AES - the Advanced Encryption Standard. Springer Verlag, 2002.
Diffie W., Van Oorschot P. C., and Wiener M. J. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, 1992, vol.2, iss. 2, pp. 107-125.
Rathgeb C. and Uhl C. A survey on biometric cryptosystems and cancelable biometrics. EURASIP J. Inform. Security, 2011, vol. 2011:3. https://doi.org/10.1186/ 1687-417X-2011-3
Geut K., Kirienko K., Sadkov P., et al. On explicit constructions for solving the problem "A secret sharing". Prikladnaya Diskretnaya Matematika. Prilozhenie, 2017, no. 10, pp. 68-70. (in Russian)
Agievich S., Gorodilova A., Idrisova V., et al. Mathematical problems of the second international student's Olympiad in cryptography. Cryptologia, 2017, vol.41, iss.6, pp.534-565.
Agievich S., Gorodilova A., Kolomeec N., et al. Problems, solutions and experience of the first international student's Olympiad in cryptography. Prikladnaya Diskretnaya Matematika, 2015, no. 3, pp. 41-62.
 Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2018. № 40. DOI: 10.17223/20710410/40/4
Mathematical methods in solutions of the problems presented at the Third International Students' Olympiad in Cryptography | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2018. № 40. DOI: 10.17223/20710410/40/4
Download full-text version
Counter downloads: 791