2014 Reports :  Cryptology ePrint Archive Forum
Discussion forum for Cryptology ePrint Archive reports posted in 2014. Please put the report number in the subject. 
Goto Thread: PreviousNext
Goto: Forum ListMessage ListNew TopicSearchLog In
2014/377
Posted by: Orr (IP Logged)
Date: 02 June 2014 05:46

This looks like a paper of "how to tranform secret key algorithm into public key one using obfuscation". Take AES-X, and obfuscate.

Re: 2014/377
Posted by: Boaz123 (IP Logged)
Date: 07 July 2014 09:25

Hi,
I think that this is not exactly obfuscation: To my understanding, obfuscation is a reversible permutation, because its actually 1-1 mapping. The process of logic synthesis proposed in the publication is inherently not reversible, because it involves a loss of information. The only way to reverse it is to go through all possible inputs and record the associated outputs, which is similar to brute force attack



Please log in for posting a message. Only registered users may post in this forum.