cryptographic puzzles
Recently Published Documents


TOTAL DOCUMENTS

11
(FIVE YEARS 3)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 30 (3) ◽  
pp. 375-390
Author(s):  
Rade Vuckovac ◽  

A puzzle lies behind password authentication (PA) and blockchain proof of work (PoW). A cryptographic hash function is commonly used to implement them. The potential problem with secure hash functions is their complexity and rigidity. We explore the use of complex systems constructs such as a cellular automaton (CA) to provide puzzle functionality. The analysis shows that computational irreducibility and sensitivity to initial state phenomena are enough to create simple puzzle systems that can be used for PA and PoW. Moreover, we present puzzle schemata using CA and n-body problems.


Mathematics ◽  
2020 ◽  
Vol 8 (12) ◽  
pp. 2160
Author(s):  
Karina Paola Jiménez ◽  
Sandra Gómez-Canaval ◽  
Ricardo Villanueva-Polanco ◽  
Silvia Martín Suazo

Networks of picture processors is a massively distributed and parallel computational model inspired by the evolutionary cellular processes, which offers efficient solutions for NP-complete problems. This bio-inspired model computes two-dimensional strings (pictures) using simple rewriting rules (evolutionary operations). The functioning of this model mimics a community of cells (pictures) that are evolving according to these bio-operations via a selection process that filters valid surviving cells. In this paper, we propose an extension of this model that empowers it with a flexible method that selects the processed pictures based on a quantitative evaluation of its content. In order to show the versatility of this extension, we introduce a solver for a cryptographic proof-of-work based on the hardness of finding a solution to a set of random quadratic equations over the finite field F2. This problem is demonstrated to be NP-hard, even with quadratic polynomials over the field F2, when the number of equations and the number of variables are of roughly the same size. The proposed solution runs in O(n2) computational steps for any size (n,m) of the input pictures. In this context, this paper opens up a wide field of research that looks for theoretical and practical solutions of cryptographic problems via software/hardware implementations based on bio-inspired computational models.


2020 ◽  
pp. 73-84
Author(s):  
Clemente Biondi Santi ◽  
Vincenzo Vespri

2013 ◽  
Vol 73 (1) ◽  
pp. 177-207 ◽  
Author(s):  
Bogdan Groza ◽  
Bogdan Warinschi

Author(s):  
Jothi Rangasamy ◽  
Douglas Stebila ◽  
Colin Boyd ◽  
Juan Manuel González-Nieto ◽  
Lakshmi Kuppusamy

2011 ◽  
Vol 3 (1) ◽  
pp. 14-36 ◽  
Author(s):  
Antonis Michalas ◽  
Nikos Komninos ◽  
Neeli R. Prasad

This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly.


Author(s):  
Pedro Peris-Lopez ◽  
Julio C. Hernandez-Castro ◽  
Juan M. E. Tapiador ◽  
Esther Palomar ◽  
Jan C.A. van der Lubbe

Sign in / Sign up

Export Citation Format

Share Document