SlideShare a Scribd company logo
Stream ciphers based on the mathematical
structure underlying the 3 body problem.
Author : Samir Bouftass , Independant crypto researcher
E-mail : crypticator@gmail.com
Stream cipher ?
1 - Key Stream Generation :
2 - Encryption :
3 – Decryption :
A KeyStream K should fulfill this condition :
The three body problem :
If we perform measurements after a time intervall T :
A modélisation of three body problem could be useful to crypto
algorithmes design.
A General Stream cipher algorithm :
Input Data :
Secret Key : Sk.
Plain Text : M = [ m_0….m_n] .
Intermediate Data :
Internal State : S = [s_0…..s_n] .
KeyStream : K = [k_0….k_n].
Output Data :
Cipher Text : C = [c_0…..c_n] .
State Initialization :
s_0 = Initialize( Sk ).
Encryption/Decryption loop :
For i = 0 to n do
s_(i+1) = F ( s_i )
k_i = G ( s_(i+1) )
c_i = k_i xor p_i
The mathematical structure underlying the three body problem.
The mathematical structure :
Set S ={ [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] …
[(p1_i,f1_i),(p2_i,f2_i),(p3_i,f3_i)] …
[(p1_n,f1_n),(p2_n,f2_n),(pi_n,fi_n)] }
Caracterized by following rules :
f1_i+1 = F1(p2_i , p3_i )
f2_i+1 = F2(p3_i , p1_i )
f3_i+1 = F3(p1_i , p2_i )
p1_i+1 = G1(f1_i+1 )
p2_i+1 = G2(f2_i+1 )
p3_i+1 = G3(f3_i+1 )
A General Stream cipher algorithm based on the mathematical
structure underlying the three body problem :
Input Data :
Secret Key : Sk.
Plain Text : M = [ m_0….m_n] .
Intermediate Data :
Internal State : S = { [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] …..
[(p1_n,f1_n),(p2_n,f2_n),(p3_n,f3_n)] }
Key Stream : K = [k_0….k_n].
Output Data :
Cipher Text: C = [c_0…..c_n].
State Initialization :
s_0 =[(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] = Initialize(Cs ).
Encryption/Decryption loop :
For i = 0 to n do
f1_i+1 = F1(p2_i , p3_i )
f2_i+1 = F2(p3_i , p1_i )
f3_i+1 = F3(p1_i , p2_i )
p1_i+1 = G1(f1_i+1 )
p2_i+1 = G2(f2_i+1 )
p3_i+1 = G3(f3_i+1 )
k_i = p1_i+1
c_i = k_i xor m_i
3XRC4 : A RC4 variant based on the mathematical structure
underlying The 3 body problème .
RC4 Algorithm:
Secret key Sk, a componed of L bytes : K[0], …, K[L-1].
Initialization :
for i : 0 to 255
S[i] : i.
j : 0
for i : 0 to 255
j : ( j + S[i] + K[i mod L ] ) mod 256
swap S[i] and S[j]
Encryption / Decryption Loop :
i : 0 , j : 0
for i : 0 to n
i : ( i+1 ) mod 256
j : ( j+S[i] ) mod 256
swap S[i] and S[j].
k_i+1 = S[( S[i] + S[j] ) mod 256 ]
c_i = k_i+1 xor m_i.
L’algorithme 3XRC4 :
Secret Key Sk =[K1, K2, K3] , Ki=1..3 a componed of L bytes : ki[0], …, ki[L-1].
Initialization :
for i : 0 to 255
S1[i] : S2[i] : S3[i] : i .
u : v : w : 0
for i : 0 to 255
u : ( u + S2[S3[i]] + K1[ i mod L ] ) mod 256
swap S1[i] and S1[u]
v : ( v + S3[S1[i]] + K2[ i mod L ] ) mod 256
swap S2[i] and S2[v]
w : ( w + S3[S1[i]] + K3[ i mod L ] ) mod 256
swap S3[i] and S3[v]
Encryption / Decryption Loop :
i : u : v : w :0
for i = 0 to n
i : ( i+1 ) mod 256
u : ( u+S2[S3[i]] ) mod 256
swap S1[i] and S1[u]
v : ( v+S3[S1[i]] ) mod 256
swap S2[i] and S2[v]
w : ( w+S1[S2[i]] ) mod 256
swap S3[i] and S3[w]
k_i+1 = S2[S3[( S1[i] + S1[u] ) mod 256 ]]
c_i = k_i+1 xor m_i.

More Related Content

What's hot

Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3
SangramNavale
 
Special factor patterns
Special factor patternsSpecial factor patterns
Special factor patterns
Cinnaminson Public Schools
 
Presentation - MA181 - Final
Presentation - MA181 - FinalPresentation - MA181 - Final
Presentation - MA181 - Final
Abraham Bedada
 
Calculus 1
Calculus 1Calculus 1
Calculus 1
hosiduy
 
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionImplementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Md. Ariful Hoque
 
Ellipse
EllipseEllipse
Ellipse
bwlomas
 
Slides to RSA Presentation
Slides to RSA PresentationSlides to RSA Presentation
Slides to RSA Presentation
David Boyhan, JD, CIPP
 
Review version 4
Review version 4Review version 4
Review version 4
Skillspire LLC
 
Sol71
Sol71Sol71
Review version 2
Review version 2Review version 2
Review version 2
Skillspire LLC
 
Cohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithmCohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithm
Shilpa Hait
 
Review
ReviewReview
Cyrus beck line clipping algorithm
Cyrus beck line clipping algorithmCyrus beck line clipping algorithm
Cyrus beck line clipping algorithm
Pooja Dixit
 
4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form
sahutchins74
 
Fast and Easy Subnetting
Fast and Easy SubnettingFast and Easy Subnetting
Fast and Easy Subnetting
Eng. Emad Al-Atoum
 
what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)
budi rahardjo
 
Review version 3
Review version 3Review version 3
Review version 3
Skillspire LLC
 
CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)
Hiroki Mizuno
 
Application of bases
Application of basesApplication of bases
Application of bases
Abdur Rehman
 
C++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPAC++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPA
Isabella789
 

What's hot (20)

Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3Report Qsn 8 CA asn 3
Report Qsn 8 CA asn 3
 
Special factor patterns
Special factor patternsSpecial factor patterns
Special factor patterns
 
Presentation - MA181 - Final
Presentation - MA181 - FinalPresentation - MA181 - Final
Presentation - MA181 - Final
 
Calculus 1
Calculus 1Calculus 1
Calculus 1
 
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionImplementation of RSA Algorithm for Speech Data Encryption and Decryption
Implementation of RSA Algorithm for Speech Data Encryption and Decryption
 
Ellipse
EllipseEllipse
Ellipse
 
Slides to RSA Presentation
Slides to RSA PresentationSlides to RSA Presentation
Slides to RSA Presentation
 
Review version 4
Review version 4Review version 4
Review version 4
 
Sol71
Sol71Sol71
Sol71
 
Review version 2
Review version 2Review version 2
Review version 2
 
Cohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithmCohen-sutherland & liang-basky line clipping algorithm
Cohen-sutherland & liang-basky line clipping algorithm
 
Review
ReviewReview
Review
 
Cyrus beck line clipping algorithm
Cyrus beck line clipping algorithmCyrus beck line clipping algorithm
Cyrus beck line clipping algorithm
 
4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form4 2 lesson - Graphing in Standard Form
4 2 lesson - Graphing in Standard Form
 
Fast and Easy Subnetting
Fast and Easy SubnettingFast and Easy Subnetting
Fast and Easy Subnetting
 
what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)what engineers don't know (but probably mathematicians do)
what engineers don't know (but probably mathematicians do)
 
Review version 3
Review version 3Review version 3
Review version 3
 
CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)CoqでGCの証明をしてみたよ(LT)
CoqでGCの証明をしてみたよ(LT)
 
Application of bases
Application of basesApplication of bases
Application of bases
 
C++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPAC++ Certified Associate Programmer CPA
C++ Certified Associate Programmer CPA
 

Similar to 3XRC4

WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
Somenath Mukhopadhyay
 
Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes
acijjournal
 
Cn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshanCn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshan
riturajj
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
Talha SAVAS
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Ferdin Joe John Joseph PhD
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
Soham Mondal
 
RSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENESRSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENES
acijjournal
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
Samir Crypticus
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
Soham Mondal
 
Wepwhacker !
Wepwhacker !Wepwhacker !
Wepwhacker !
Cricket Match
 
Asssignment2
Asssignment2 Asssignment2
Asssignment2
AnnamalikAnnamalik
 
15
1515
15
1515
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
Saif Kassim
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
wellesleyterresa
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
Sayantan Sur
 
Basics of Cryptography
Basics of CryptographyBasics of Cryptography
Basics of Cryptography
Sunil Kumar
 
Chapter Eight(2)
Chapter Eight(2)Chapter Eight(2)
Chapter Eight(2)
bolovv
 
NCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based EncryptionNCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based Encryption
National Chengchi University
 
i need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdfi need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdf
shreeaadithyaacellso
 

Similar to 3XRC4 (20)

WiFi Security Explained
WiFi Security ExplainedWiFi Security Explained
WiFi Security Explained
 
Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes Rsa Signature: Behind The Scenes
Rsa Signature: Behind The Scenes
 
Cn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshanCn os-lp lab manual k.roshan
Cn os-lp lab manual k.roshan
 
Data Protection Techniques and Cryptography
Data Protection Techniques and CryptographyData Protection Techniques and Cryptography
Data Protection Techniques and Cryptography
 
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in BlockchainBlockchain Technology - Week 6 - Role of Cryptography in Blockchain
Blockchain Technology - Week 6 - Role of Cryptography in Blockchain
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
RSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENESRSA SIGNATURE: BEHIND THE SCENES
RSA SIGNATURE: BEHIND THE SCENES
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
Wepwhacker !
Wepwhacker !Wepwhacker !
Wepwhacker !
 
Asssignment2
Asssignment2 Asssignment2
Asssignment2
 
15
1515
15
 
15
1515
15
 
Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02Computer Security (Cryptography) Ch02
Computer Security (Cryptography) Ch02
 
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docxHW 5-RSAascii2str.mfunction str = ascii2str(ascii)        .docx
HW 5-RSAascii2str.mfunction str = ascii2str(ascii) .docx
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
Basics of Cryptography
Basics of CryptographyBasics of Cryptography
Basics of Cryptography
 
Chapter Eight(2)
Chapter Eight(2)Chapter Eight(2)
Chapter Eight(2)
 
NCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based EncryptionNCCU CPDA Lecture 12 Attribute Based Encryption
NCCU CPDA Lecture 12 Attribute Based Encryption
 
i need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdfi need help fixing my program so that the user can input both uper and.pdf
i need help fixing my program so that the user can input both uper and.pdf
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

3XRC4

  • 1. Stream ciphers based on the mathematical structure underlying the 3 body problem.
  • 2. Author : Samir Bouftass , Independant crypto researcher E-mail : crypticator@gmail.com
  • 4. 1 - Key Stream Generation :
  • 7. A KeyStream K should fulfill this condition :
  • 8. The three body problem :
  • 9. If we perform measurements after a time intervall T :
  • 10. A modélisation of three body problem could be useful to crypto algorithmes design.
  • 11. A General Stream cipher algorithm : Input Data : Secret Key : Sk. Plain Text : M = [ m_0….m_n] . Intermediate Data : Internal State : S = [s_0…..s_n] . KeyStream : K = [k_0….k_n]. Output Data : Cipher Text : C = [c_0…..c_n] .
  • 12. State Initialization : s_0 = Initialize( Sk ). Encryption/Decryption loop : For i = 0 to n do s_(i+1) = F ( s_i ) k_i = G ( s_(i+1) ) c_i = k_i xor p_i
  • 13. The mathematical structure underlying the three body problem.
  • 14. The mathematical structure : Set S ={ [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] … [(p1_i,f1_i),(p2_i,f2_i),(p3_i,f3_i)] … [(p1_n,f1_n),(p2_n,f2_n),(pi_n,fi_n)] } Caracterized by following rules : f1_i+1 = F1(p2_i , p3_i ) f2_i+1 = F2(p3_i , p1_i ) f3_i+1 = F3(p1_i , p2_i ) p1_i+1 = G1(f1_i+1 ) p2_i+1 = G2(f2_i+1 ) p3_i+1 = G3(f3_i+1 )
  • 15. A General Stream cipher algorithm based on the mathematical structure underlying the three body problem : Input Data : Secret Key : Sk. Plain Text : M = [ m_0….m_n] . Intermediate Data : Internal State : S = { [(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] ….. [(p1_n,f1_n),(p2_n,f2_n),(p3_n,f3_n)] } Key Stream : K = [k_0….k_n]. Output Data : Cipher Text: C = [c_0…..c_n].
  • 16. State Initialization : s_0 =[(p1_0,f1_0),(p2_0,f2_0),(p3_0,f3_0)] = Initialize(Cs ). Encryption/Decryption loop : For i = 0 to n do f1_i+1 = F1(p2_i , p3_i ) f2_i+1 = F2(p3_i , p1_i ) f3_i+1 = F3(p1_i , p2_i ) p1_i+1 = G1(f1_i+1 ) p2_i+1 = G2(f2_i+1 ) p3_i+1 = G3(f3_i+1 ) k_i = p1_i+1 c_i = k_i xor m_i
  • 17. 3XRC4 : A RC4 variant based on the mathematical structure underlying The 3 body problème .
  • 18. RC4 Algorithm: Secret key Sk, a componed of L bytes : K[0], …, K[L-1]. Initialization : for i : 0 to 255 S[i] : i. j : 0 for i : 0 to 255 j : ( j + S[i] + K[i mod L ] ) mod 256 swap S[i] and S[j]
  • 19. Encryption / Decryption Loop : i : 0 , j : 0 for i : 0 to n i : ( i+1 ) mod 256 j : ( j+S[i] ) mod 256 swap S[i] and S[j]. k_i+1 = S[( S[i] + S[j] ) mod 256 ] c_i = k_i+1 xor m_i.
  • 20.
  • 22. Secret Key Sk =[K1, K2, K3] , Ki=1..3 a componed of L bytes : ki[0], …, ki[L-1]. Initialization : for i : 0 to 255 S1[i] : S2[i] : S3[i] : i . u : v : w : 0 for i : 0 to 255 u : ( u + S2[S3[i]] + K1[ i mod L ] ) mod 256 swap S1[i] and S1[u] v : ( v + S3[S1[i]] + K2[ i mod L ] ) mod 256 swap S2[i] and S2[v] w : ( w + S3[S1[i]] + K3[ i mod L ] ) mod 256 swap S3[i] and S3[v]
  • 23. Encryption / Decryption Loop : i : u : v : w :0 for i = 0 to n i : ( i+1 ) mod 256 u : ( u+S2[S3[i]] ) mod 256 swap S1[i] and S1[u] v : ( v+S3[S1[i]] ) mod 256 swap S2[i] and S2[v] w : ( w+S1[S2[i]] ) mod 256 swap S3[i] and S3[w] k_i+1 = S2[S3[( S1[i] + S1[u] ) mod 256 ]] c_i = k_i+1 xor m_i.