Skip Content
You are currently on the new version of our website. Access the old version .

Cryptography

Cryptography is an international, scientific, peer-reviewed, open access journal on cryptography published bimonthly online by MDPI.

Quartile Ranking JCR - Q2 (Computer Science, Theory and Methods)

All Articles (445)

On Tabu Search for Block Cyphers Cryptanalysis

  • Adrian Donatien-Charon,
  • Mijail Borges-Quintana and
  • Guillermo Sosa-Gómez
  • + 2 authors

This article presents general methodologies for plaintext attacks on block ciphers using the Tabu Search algorithm. These methods treat the cipher as a black box, with the objective of finding the session key. The primary innovation of our approach is the division of the key space into subsets based on a divisor, enabling the attack to focus on a specific portion of the total space. The following investigation demonstrates the successful application of these methods to a member of a block cipher family that includes the Advanced Encryption Standard (AES) cipher. One of the proposed methodologies, the subregions path attack, enables navigation of the key session space by applying specific predetermined strategies within these subregions.

27 January 2026

Iterations, time and estimated time of the 50 experiments.

Autopotency and Conjugacy of Non-Diagonalizable Matrices for Challenge–Response Authentication

  • Daniel Alarcón-Narváez,
  • Luis Adrián Lizama-Pérez and
  • Fausto Abraham Jacques-García

We present an algebraic framework for constructing challenge–response authentication protocols based on powers of non-diagonalizable matrices over finite fields. The construction relies on upper triangular Toeplitz matrices with a single Jordan block and on their structured power expansions, which induce nonlinear relations between matrix parameters and exponents through an autopotency phenomenon. The protocol is built from a cyclic family of matrix products derived from secret matrices : for each index i, a product is formed (indices modulo n), and its power Pi(x) is published for a secret exponent x. The resulting family of powered products is linked by conjugation via the unknown factors Ai, enabling an interactive authentication mechanism in which the prover demonstrates the knowledge of selected factors by satisfying explicit conjugacy relations. We formalize the underlying algebraic problems in terms of factor recovery and conjugacy identification from powered products, and analyze how the enforced non-diagonalizable structure and Toeplitz constraints lead to coupled multivariate polynomial systems. These systems arise naturally from the algebraic design of the construction and do not admit immediate reductions to classical discrete logarithm settings. The framework illustrates how non-diagonalizable matrix structures and structured conjugacy relations can be used to define concrete authentication primitives in noncommutative algebraic settings, and provides a basis for further cryptanalytic and cryptographic investigation.

18 January 2026

Schematic view of the challenge–response protocol. Bob publishes 
  
    K
    pub
  
 during setup. In each session, Alice issues a random challenge index i, Bob reveals the corresponding secret matrix 
  
    A
    i
  
, and Alice verifies the conjugacy relation 
  
    
      A
      i
      
        −
        1
      
    
    
      P
      i
      
        (
        x
        )
      
    
    
      A
      i
    
    =
    
      P
      
        σ
        (
        i
        )
      
      
        (
        x
        )
      
    
  
.

Secure Implementation of RISC-V’s Scalar Cryptography Extension Set

  • Asmaa Kassimi,
  • Abdullah Aljuffri and
  • Mottaqiallah Taouil
  • + 2 authors

Instruction Set Architecture (ISA) extensions, particularly scalar cryptography extensions (Zk), combine the performance advantages of hardware with the adaptability of software, enabling the direct and efficient execution of cryptographic functions within the processor pipeline. This integration eliminates the need to communicate with external cores, substantially reducing latency, power consumption, and hardware overhead, making it especially suitable for embedded systems with constrained resources. However, current scalar cryptography extension implementations remain vulnerable to physical threats, notably power side-channel attacks (PSCAs). These attacks allow adversaries to extract confidential information, such as secret keys, by analyzing the power consumption patterns of the hardware during operation. This paper presents an optimized and secure implementation of the RISC-V scalar Advanced Encryption Standard (AES) extension (Zkne/Zknd) using Domain-Oriented Masking (DOM) to mitigate first-order PSCAs. Our approach features optimized assembly implementations for partial rounds and key scheduling alongside pipeline-aware microarchitecture optimizations. We evaluated the security and performance of the proposed design using the Xilinx Artix7 FPGA platform. The results indicate that our design is side-channel-resistant while adding a very low area overhead of 0.39% to the full 32-bit CV32E40S RISC-V processor. Moreover, the performance overhead is zero when the extension-related instructions are properly scheduled.

17 January 2026

AES Encryption and Decryption.
  • Feature Paper
  • Article
  • Open Access

Lower Bound on the Overlattice-Based Sieve Algorithm

  • Tongchen Shen,
  • Xiangxue Li and
  • Licheng Wang

Lattice-based cryptography stands as one of the most pivotal candidates in post-quantum cryptography. To configure the parameters of lattice-based cryptographic schemes, a thorough comprehension of their concrete security is indispensable. Lattice sieving algorithms represent among the most critical tools for conducting concrete security analysis. Currently, the state-of-the-art BDGL-sieve (SODA 2016) achieves a time complexity of , and Kirshanova and Laarhoven (CRYPTO 2021) have proven that the BDGL-sieve attains the lower bound under the technical paradigm of the Nearest Neighbor Search (NNS) problem. A natural question emerges: whether overlattice-based sieving algorithms (ANTS 2014) can outperform the BDGL-sieve within an alternative technical framework. This work provides an almost negative response to this question. Specifically, we propose a generalized overlattice tower model, which facilitates the proof of the lower bound for the overlattice-based method. Our findings indicate that the original Overlattice-sieve has already reached this lower bound. Consequently, the BDGL-sieve will maintain its status as the sieving algorithm with optimal time complexity, unless a revolutionary technical optimization is developed in the future.

1 January 2026

Sublattices and overlattices.

News & Conferences

Issues

Open for Submission

Editor's Choice

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Cryptography - ISSN 2410-387X