Quasigroups and their applications in cryptography

Quasigroups have wide applications in coding theory and cryptography. We present a brief survey on quasigroups and discuss their applications in designing various cryptographic primitives including...

[1]  Danilo Gligoroski Stream cipher based on quasigroup string transformations in Zp* , 2004, ArXiv.

[2]  Danilo Gligoroski,et al.  Using quasigroups for one one secure encoding , 2002 .

[3]  G. Mullen,et al.  Discrete Mathematics Using Latin Squares , 1998, The Mathematical Gazette.

[4]  J. Dénes,et al.  Latin squares and their applications , 1974 .

[5]  Václav Snásel,et al.  Hash Functions Based on Large Quasigroups , 2009, ICCS.

[6]  Yehuda Lindell,et al.  Introduction to Modern Cryptography , 2004 .

[7]  Bruce Schneier,et al.  Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..

[8]  Smile Markovski,et al.  Quasigroup String Transformations and Hash Function Design , 2009, ICT Innovations.

[9]  Jonathan D. H. Smith An Introduction to Quasigroups and Their Representations , 2006 .

[10]  J. Dénes On Latin squares and a digital encrypting communication system , 2000 .

[11]  Antoine Joux,et al.  Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.

[12]  Jean-Sébastien Coron,et al.  Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.

[13]  Ljupco Kocarev,et al.  Error-Correcting Codes Based on Quasigroups , 2007, 2007 16th International Conference on Computer Communications and Networks.

[14]  Peter J. Cameron,et al.  A Collection of Contributions in Honour of Jack Van Lint , 1992 .

[15]  Jintai Ding,et al.  Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL , 2008, IACR Cryptol. ePrint Arch..

[16]  R. Moufang,et al.  Zur Struktur von Alternativkörpern , 1935 .

[17]  Ljupco Kocarev,et al.  Edon-R, An Infinite Family of Cryptographic Hash Functions , 2009, Int. J. Netw. Secur..

[18]  Danilo Gligoroski,et al.  The Multivariate Probabilistic Encryption Scheme MQQ-ENC , 2012, IACR Cryptol. ePrint Arch..

[19]  Jonathan D. H. Smith,et al.  Quasigroups and loops : theory and applications , 1990 .

[20]  Danilo Gligoroski,et al.  Edon-$\Cal R (256,384,512)$ -- an efficient implementation of Edon-$\Cal R$ family of cryptographic hash functions , 2008 .

[21]  Josef Pieprzyk,et al.  A Message Authentication Code Based on Latin Squares , 1997, ACISP.

[22]  Jennifer Seberry,et al.  Encryption methods based on combinatorial designs , 1986 .

[23]  Victor A. Shcherbacov,et al.  Elements of Quasigroup Theory and Applications , 2017 .

[24]  Smile Markovski,et al.  Shapeless Quasigroups Derived by Feistel Orthomorphisms , 2012 .

[26]  Danilo Gligoroski,et al.  Edon-R(256, 384, 512) - an Efficient Implementation of Edon-R} Family of Cryptographic Hash Functions , 2007, IACR Cryptol. ePrint Arch..

[27]  Danilo Gligoroski,et al.  The Stream Cipher Edon80 , 2008, The eSTREAM Finalists.

[28]  Victor Shcherbacov,et al.  Elements of quasigroup theory and some its applications in code theory and cryptology , 2003 .

[29]  Stefan Lucks,et al.  A Failure-Friendly Design Principle for Hash Functions , 2005, ASIACRYPT.

[30]  Martin Hell,et al.  A Key Recovery Attack on Edon80 , 2007, ASIACRYPT.

[31]  A. Donald Keedwell,et al.  A new authentication scheme based on latin squares , 1992, Discret. Math..

[32]  Ji Li,et al.  Collision attack on NaSHA-512 , 2008, IACR Cryptol. ePrint Arch..

[33]  Stefan Lucks,et al.  Design Principles for Iterated Hash Functions , 2004, IACR Cryptol. ePrint Arch..

[34]  Mariko Hagita,et al.  A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software , 2007, Selected Areas in Cryptography.

[35]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[37]  A. Sade Groupoï des automorphes par le groupe cyclique , 1957 .

[38]  N. Courtois,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[39]  Smile Markovski,et al.  Generating huge quasigroups from small non-linear bijections via extended Feistel function , 2009 .

[40]  Anton Suschkewitsch On a generalization of the associative law , 1929 .

[41]  Danilo Gligoroski,et al.  Quasigroups as Boolean Functions, Their Equation Systems and Gröbner Bases , 2009, Gröbner Bases, Coding, and Cryptography.

[42]  Verica Bakeva,et al.  QUASIGROUP STRING PROCESSING: PART 4 , 1999 .

[43]  Vesna Dimitrova,et al.  Block Cipher Defined by Matrix Presentation of Quasigroups , 2021, IACR Cryptol. ePrint Arch..

[44]  Czesław Kościelny Generating quasigroups for cryptographic applications , 2002 .

[45]  Ljupco Kocarev,et al.  Unbiased Random Sequences from Quasigroup String Transformations , 2005, FSE.

[46]  Victor Shcherbacov ON SOME KNOWN POSSIBLE APPLICATIONS OF QUASIGROUPS IN CRYPTOLOGY , 2003 .

[47]  A. D. Keedwell,et al.  Some applications of non-associative algebraic systems in cryptology , 2001 .

[48]  Danilo Gligoroski,et al.  On a Conditional Collision Attack on NaSHA-512 , 2009, IACR Cryptol. ePrint Arch..

[49]  Verica Bakeva,et al.  On Random Error Correcting Codes Based on Quasigroups , 2011 .

[50]  A. D. Keedwell,et al.  Latin Squares: New Developments in the Theory and Applications , 1991 .

[51]  R. H. Bruck A Survey of Binary Systems , 1971 .

[52]  Dengguo Feng,et al.  Boolean Functions and Their Applications in Cryptography , 2016, Advances in Computer Science and Technology.

[53]  J. Markovski,et al.  On Quasigroup Pseudo Random Sequence Generators , 2003 .

[54]  Mohamed El-Hadedy,et al.  Cryptographic hash function Edon-R′ , 2009, 2009 Proceedings of the 1st International Workshop on Security and Communication Networks.

[55]  Adi Shamir,et al.  A New Class of Invertible Mappings , 2002, CHES.

[56]  Danilo Gligoroski,et al.  MQQ-SIG - An Ultra-Fast and Provably CMA Resistant Digital Signature Scheme , 2011, INTRUST.

[57]  Andrew W. Appel,et al.  Formal aspects of mobile code security , 1999 .

[58]  Danilo Gligoroski,et al.  A Public Key Block Cipher Based on Multivariate Quadratic Quasigroups , 2008, IACR Cryptol. ePrint Arch..

[59]  Eric W. Weisstein Cryptographic Hash Function , 2000 .

[60]  조위덕 Cryptography , 1987, The Official (ISC)2 SSCP CBK Reference.

[61]  Danilo Gligoroski,et al.  A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems , 2014, Public Key Cryptography.

[62]  Danilo Gligoroski,et al.  Construction of Optimal 4-bit S-boxes by Quasigroups of Order 4 , 2012, SECURWARE 2012.

[63]  Mariko Hagita,et al.  CryptMT3 Stream Cipher , 2008, The eSTREAM Finalists.

[64]  Danilo Gligoroski,et al.  Multivariate quadratic trapdoor functions based on multivariate quadratic quasigroups , 2008 .

[65]  John Kelsey,et al.  Herding Hash Functions and the Nostradamus Attack , 2006, EUROCRYPT.

[66]  Serge Vaudenay,et al.  Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.

[67]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.