Attack on lattice shortest vector problem using K-Nearest Neighbour

Published in Iran Journal of Computer Science, Springer , 2024

In our study, we tackle the challenge of attacking lattice problems in two-dimensional, four-dimensional, and ten-dimensional spaces using the K-Nearest Neighbors (KNN) machine learning algorithm. However, the Shortest Vector Problem remains a hurdle. Our findings show that our proposed approach achieves up to 80% accuracy in two dimensions and 65% accuracy in ten dimensions on self-prepared datasets.

Lattice Reduction Using K-Means Algorithm

Published in EAI Endorsed Transactions , 2024

Lattice-based cryptography, the leading post-quantum encryption method, addresses the shortcomings of traditional systems like RSA and DSA, which rely on the intractability of problems threatened by quantum computing. A major challenge in this field is the Shortest Vector Problem (SVP). This work uses the K-means machine learning technique to tackle lattice issues in two- to ten-dimensional spaces, achieving up to 60% accuracy on self-prepared datasets, thereby enhancing lattice-based cryptography’s security against quantum threats.

Secure Code Signing Using Ring- Tesla Signature

Published in 5th International Conference on Trends in Computational and Cognitive Engineering, Springer , 2024

In our study, we tackle the challenge of attacking lattice problems in two-dimensional, four-dimensional, and ten-dimensional spaces using the K-Nearest Neighbors (KNN) machine learning algorithm. However, the Shortest Vector Problem remains a hurdle. Our findings show that our proposed approach achieves up to 80% accuracy in two dimensions and 65% accuracy in ten dimensions on self-prepared datasets.

New Hash Algorithm using 3X+1 Conjecture

Published in IEEE (Institute of Electrical and Electronics Engineers) , 2024

The one-way function based on the Collatz problem is proposed. It is based on the problem’s conditional branching structure which is not considered as important even when the 3x + 1 question is quite famous. The analysis shows why the problem is mathematically so inaccessible and how the algorithm's conditional branching structure can be used to construct one-way functions. It also shows exponential dependence between the algorithm’s conditional branching and the running cost of algorithm branch-less reductions.

Attack on Shortest Vector Problem of Lattice using Machine Learning

Published in 5th International Conference on Trends in Computational and Cognitive Engineering, Springer , 2023

In this paper, we studied the attack on the Shortest Vector Problem (SVP) in lattice-based cryptography using the K-Nearest Neighbor (KNN) machine learning algorithm, achieving up to 79% accuracy on self-prepared datasets. Traditional cryptographic systems rely on the intractability of prime number factoring or the discrete logarithm problem, but lattice-based methods are gaining popularity to enhance security against quantum computing. Despite challenges like the SVP, our approach demonstrates promising results in addressing these attacks, particularly in two-dimensional cases.



Post Quantum Cryptography & its Comparison with Classical Cryptography

Published in arXiv, 2024

Cryptography ensures secure communication, with classical methods based on math while quantum cryptography leverages quantum mechanics for enhanced security. Quantum systems detect and prevent eavesdropping, offering a new level of protection. Contrasting classical and quantum cryptography highlights the revolutionary impact of quantum mechanics on secure communication.

Quantum Cryptography and its Application

Published in International Conference on Computational Mathematics & Engineering Applications (ICCMEA) , 2022

Current cryptography relies on math problems vulnerable to increasing computing power, necessitating quantum cryptography for secure communication. Quantum cryptography, leveraging quantum physics, emerges as a promising solution in the face of evolving computational capabilities. This paper reviews quantum cryptography fundamentals and analyzes its applications and limitations in the computer industry.

Applications of Cryptography in Blockchain

Published in International Conference on Computational Mathematics & Engineering Applications (ICCMEA) , 2022

Blockchain integrates various computer technologies like distributed data storage, encryption, and peer-to-peer transmission in a decentralized and secure manner. Cryptography is pivotal for user information and transaction security within blockchain. This paper outlines blockchain infrastructure and analyzes the application of encryption technologies across its layers. It addresses existing security issues and suggests future research directions for blockchain.