Lưu Hồng Dũng | Military Technical Academy (original) (raw)

Papers by Lưu Hồng Dũng

Research paper thumbnail of A solution for constructing quantum – resistant digital signature schemes

Journal of Military Science and Technology, 2024

Research paper thumbnail of THE POST - QUANTUM AND PUBLIC - KEY BLOCK CIPHER ALGORITHMS BASED ON C.E. SHANNON'S THEORY OF PERFECT SECRECY

Journal of Science and Technique, ISSN 1859-0209, 2024

We welcome contributions to the PHANTOM project. Please fork the repository and submit pull reque... more We welcome contributions to the PHANTOM project. Please fork the repository and submit pull requests for review: https://github.com/test-sum/phantom-encryption-crypto/

Research paper thumbnail of A SOLUTION FOR CONSTRUCTING QUANTUM - RESISTANT DIGITAL SIGNATURE SCHEMES

Journal of Military Science and Technology, ISSN: 1859-1043, 2024

Research paper thumbnail of A TYPE OF POST - QUANTUM CRYPTOGRAPHIC ALGORITHM

Journal of Science and Technique, 2024

The article proposes a type of post-quantum cryptographic algorithm based on hash function and OT... more The article proposes a type of post-quantum cryptographic algorithm based on hash function and OTP (One-Time Pad) cipher. Due to inheriting a property called "perfect secrecy" of the OTP cipher, the algorithms constructed according to the method proposed here can resist various types of attacks with the help of quantum computers. In addition to high security, algorithms of this type also have the ability to authenticate the origin and integrity of the encrypted messages. On the other hand, the one-time key for encryption/decryption is established for each individual message while the management and distribution of the shared secret key between the sender/encryptor and receiver/decryptor is performed similar to symmetric-key cryptosystems being applied in practice.

Research paper thumbnail of A METHOD FOR CONSTRUCTING PUBLIC - KEY BLOCK CIPHER SCHEMES BASED ON DISCRETE LOGARITHM PROBLEM

Journal of Military Science and Technology, 2023

The paper proposes a method for constructing block cipher schemes that enable verifying the sourc... more The paper proposes a method for constructing block cipher schemes that enable verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.

Research paper thumbnail of A TYPE OF PUBLIC-KEY BLOCK CIPHER ALGORITHM

Journal of Military Science and Technology, 2023

The paper proposes a type of block cipher algorithm based on cryptographic hash function and publ... more The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

Research paper thumbnail of Constructing digital signature scheme based on the new hard problem on the elliptic curve

Journal of Military Science and Technology, 2023

In this paper, the authors propose a solution to improve the security of the digital signature sc... more In this paper, the authors propose a solution to improve the security of the digital signature scheme, this solution is implemented on two levels of digital signature scheme construction. At the first level, the authors propose a new hard problem, different from the hard problems used before, and importantly, this hard problem belongs to the class of hard problems for which there is currently no solution (except by the "brute force attack" method). At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.

Research paper thumbnail of PUBLIC-KEY BLOCK CIPHER

Journal of Science and Technique , 2023

The paper proposes a type of block cipher scheme based on cryptographic hash function and public ... more The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

Research paper thumbnail of A METHOD FOR CONSTRUCTING DIGITAL SIGNATURE SCHEMES BASED ON NEW HARD PROBLEM ON THE ELLIPTIC CURVE

Journal of Science and Technique , 2023

In this paper, the authors propose a solution to improve the secure of digital signature schemes,... more In this paper, the authors propose a solution to improve the secure of digital signature schemes, this solution is implemented on two levels of digital signature scheme construction. At the first level, the authors propose a new hard problem, this hard problem belongs to the class of hard problems for which there is currently no solution (except by "brute force attack" method). At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.

Research paper thumbnail of A PUBLIC KEY ENCRYPTION -AUTHENTICATION SCHEME BASED ON ELGAMAL CRYPTOGRAPHIC ALGORITHM

Journal of Science and Technique - ISSN 1859-0209, 2023

The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This schem... more The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.

Research paper thumbnail of A NEW METHOD FOR CONSTRUCTING DIGITAL SIGNATURE SCHEME BASED ON NEW HARD PROBLEM

Journal of Science and Technique - ISSN 1859-0209, 2022

Research in the field of public key cryptography in general and digital signatures in particular ... more Research in the field of public key cryptography in general and digital signatures in particular is often considered and evaluated at two levels: The first level is considering the mathematical basis for constructing cryptographic and digital signature algorithms, especially these difficult problems: factorizing a large integer into prime factors, finding root problem, discrete logarithm problem, discrete logarithm problem on elliptic curve... The second level is constructing cryptographic and digital signatures algorithms on these hard problems including RSA, DSA, Schnorr, GOST R34.10-94. At the first level, research focuses mainly on improving algorithms for finding large primes, structures for strong primes and algorithms to attack these problems efficiently. At the second level, the research concentrates on improving the existing algorithms to enhance the safety or effective performance of the algorithm. In this article, the authors propose a solution to improve the security of digital signature schemes, implemented in both levels of digital signatures. At the first level, the authors propose a new hard problem-different from the hard problems used before and hasn't been solved by anyone so far (except by "brute force attack" method). At the second level, the authors propose a method to construct new digital signature algorithms that can help create not only one but also a family of new digital signature algorithms with high security level for practical applications. Index terms Digital signature, digital signature scheme, discrete logarithm problem, dinding root problem, discrete logarithm combining finding root problem.

Research paper thumbnail of SOME VARIANTS OF THE SCHNORR SIGNATURE SCHEMA ON THE FINITE FIELD AND THE ELLIPTIC CURVE

Journal of Science and Technique - ISSN 1859-0209, 2022

Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schema... more Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schemas that are not only highly secure but are also rated as having the highest performance among signature schemas based on discrete logarithm problems (on the F p finite field and on the elliptic curve). The Schnorr and EC-Schnorr schemas have been incorporated into ISO/IEC 14888-3 and the BSI standard of the Federal Republic of Germany. Currently, the development of signature schemas based on Schnorr and EC-Schnorr schemas for BlockChain applications and digital currencies is of great interest. In this article the authors suggest several variations of the Schnorr schema on the finite field and the elliptic curve. The analyses in the article shows that the new schemas proposed here have the same security and performance as the Schnorr/EC-Schnorr signature schema in practical applications.

Research paper thumbnail of A NEW CONSTRUCTION METHOD OF DIGITAL SIGNATURE SCHEME BASED ON THE DISCRETE LOGARITHM COMBINING FIND ROOT PROBLEM ON THE FINITE FIELD

Journal of Military Science and Technology, Special issue No.6, 12- 2022, 2022

The article proposes a method to build a signature scheme based on a new hard problem, called the... more The article proposes a method to build a signature scheme based on a new hard problem, called the logarithm problem with roots on the finite field. Now, this is a hard problem belonging to the class of unsolvable problems, except for the "brute force" method. Therefore, building a digital signature scheme based on the difficulty of this problem will most likely allow improving the security of the digital signature algorithm according to the proposed new method. In addition, the method of building signature schema here can be applied to develop a class of signature algorithms suitable for applications with high requirements for security in practice applications.

Research paper thumbnail of A METHOD FOR CONSTRUCTING PUBLIC-KEY BLOCK CIPHER SCHEMES BASED ON ELLIPTIC CURVES

Journal of Military Science and Technology, Special issue No.6, 12- 2022, 2022

The article proposes a method for constructing public-key block cipher schemes based on the diffi... more The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message. In addition, a shared secret key is established between the sender/encryptor and the receiver/decryptor for each encrypted message based on public key cryptography which also improves the security of these cipher schemes.

Research paper thumbnail of GIAO THỨC TRAO ĐỔI KHÓA AN TOÀN, HIỆU QUẢ CHO CÁC HỆ MẬT KHÓA ĐỐI XỨNG

Journal of Military Science and Technology, 2020

Bài báo đề xuất xây dựng giao thức trao đổi khóa an toàn cho các hệ mật khóa đối xứng phát triển ... more Bài báo đề xuất xây dựng giao thức trao đổi khóa an toàn cho các hệ mật khóa đối xứng phát triển từ giao thức Diffie-Hellman. Giao thức mới đề xuất không sử dụng chữ ký số cho việc xác thực như các giao thức đã được phát triển trước đó, nhờ đó đã nâng cao được hiệu quả thực hiện của thuật toán, song vẫn bảo đảm đầy đủ các tính chất của một giao thức trao đổi khóa an toàn.

Research paper thumbnail of MỘT GIẢI PHÁP XÂY DỰNG HỆ MẬT KHÓA ĐỐI XỨNG

Tạp chí AN TOÀN THÔNG TIN, 2020

Research paper thumbnail of A HIGH-PERFORMANCE AUTHENTICATION-ENCRYPTION SCHEME

Journal of Science and Technique - ISSN 1859-0209, 2022

This paper proposes an encryption scheme that enables verifying the source and integrity of the e... more This paper proposes an encryption scheme that enables verifying the source and integrity of the encrypted message. Additionally, the proposed scheme generates a secret key which is shared between the sender/encryptor and the receiver/decryptor for each encrypted message using public key cryptography.

Research paper thumbnail of THUẬT TOÁN MÃ HÓA - XÁC THỰC THÔNG TIN PHÁT TRIỂN TỪ MẬT MÃ OTP

Journal of Military Science and Technology, 2020

Bài báo đề xuất thuật toán mã hóa – xác thực thông tin từ việc phát triển mật mã sử dụng khóa một... more Bài báo đề xuất thuật toán mã hóa – xác thực thông tin từ việc phát triển mật mã sử dụng khóa một lần - OTP (One - Time Pad). Ưu điểm của thuật toán mới đề xuất là có tính an toàn và hiệu quả thực hiện cao tương tự OTP, đồng thời việc thiết lập, quản lý - phân phối và sử dụng khóa hoàn toàn giống như các hệ mã khóa đối xứng đang được ứng dụng trong thực tế (DES, AES…).

Research paper thumbnail of GIAO THỨC TRAO ĐỔI KHÓA AN TOÀN CHO CÁC HỆ MẬT KHÓA ĐỐI XỨNG

FAIR - NGHIÊN CỨU CƠ BẢN VÀ ỨNG DỤNG CÔNG NGHỆ THÔNG TIN - 2017, Aug 17, 2017

Bài báo đề xuất xây dựng giao thức thỏa thuận khóa an toàn cho các hệ mật mã khóa đối xứng phát t... more Bài báo đề xuất xây dựng giao thức thỏa thuận khóa an toàn cho các hệ mật mã khóa đối xứng phát triển từ giao thức Diffie-Hellman. Các giao thức mới đề xuất có ưu điểm là các khóa bí mật chia sẻ tạo ra được xác thực về nguồn gốc nên có thể chống lại các kiểu tấn công giả mạo rất hiệu quả.

Research paper thumbnail of VARIANT OF OTP CIPHER WITH SYMMETRIC KEY SOLUTION

Journal of Science and Technique - Section on Information and Communication Technology: Vol. 9 No. 02 (2020)., 2020

The paper proposes a solution to construct symmetric-key cryptographic algorithms based on OTP ci... more The paper proposes a solution to construct symmetric-key cryptographic algorithms based on OTP cipher developed based on the cipher One-Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management-distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,.. .).

Research paper thumbnail of A solution for constructing quantum – resistant digital signature schemes

Journal of Military Science and Technology, 2024

Research paper thumbnail of THE POST - QUANTUM AND PUBLIC - KEY BLOCK CIPHER ALGORITHMS BASED ON C.E. SHANNON'S THEORY OF PERFECT SECRECY

Journal of Science and Technique, ISSN 1859-0209, 2024

We welcome contributions to the PHANTOM project. Please fork the repository and submit pull reque... more We welcome contributions to the PHANTOM project. Please fork the repository and submit pull requests for review: https://github.com/test-sum/phantom-encryption-crypto/

Research paper thumbnail of A SOLUTION FOR CONSTRUCTING QUANTUM - RESISTANT DIGITAL SIGNATURE SCHEMES

Journal of Military Science and Technology, ISSN: 1859-1043, 2024

Research paper thumbnail of A TYPE OF POST - QUANTUM CRYPTOGRAPHIC ALGORITHM

Journal of Science and Technique, 2024

The article proposes a type of post-quantum cryptographic algorithm based on hash function and OT... more The article proposes a type of post-quantum cryptographic algorithm based on hash function and OTP (One-Time Pad) cipher. Due to inheriting a property called "perfect secrecy" of the OTP cipher, the algorithms constructed according to the method proposed here can resist various types of attacks with the help of quantum computers. In addition to high security, algorithms of this type also have the ability to authenticate the origin and integrity of the encrypted messages. On the other hand, the one-time key for encryption/decryption is established for each individual message while the management and distribution of the shared secret key between the sender/encryptor and receiver/decryptor is performed similar to symmetric-key cryptosystems being applied in practice.

Research paper thumbnail of A METHOD FOR CONSTRUCTING PUBLIC - KEY BLOCK CIPHER SCHEMES BASED ON DISCRETE LOGARITHM PROBLEM

Journal of Military Science and Technology, 2023

The paper proposes a method for constructing block cipher schemes that enable verifying the sourc... more The paper proposes a method for constructing block cipher schemes that enable verifying the source and integrity of the encrypted message. Additionally, the shared secret key between the sender/encryptor and the receiver/decryptor for each encrypted message is established based on the mechanism of public key cryptography.

Research paper thumbnail of A TYPE OF PUBLIC-KEY BLOCK CIPHER ALGORITHM

Journal of Military Science and Technology, 2023

The paper proposes a type of block cipher algorithm based on cryptographic hash function and publ... more The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

Research paper thumbnail of Constructing digital signature scheme based on the new hard problem on the elliptic curve

Journal of Military Science and Technology, 2023

In this paper, the authors propose a solution to improve the security of the digital signature sc... more In this paper, the authors propose a solution to improve the security of the digital signature scheme, this solution is implemented on two levels of digital signature scheme construction. At the first level, the authors propose a new hard problem, different from the hard problems used before, and importantly, this hard problem belongs to the class of hard problems for which there is currently no solution (except by the "brute force attack" method). At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.

Research paper thumbnail of PUBLIC-KEY BLOCK CIPHER

Journal of Science and Technique , 2023

The paper proposes a type of block cipher scheme based on cryptographic hash function and public ... more The paper proposes a type of block cipher scheme based on cryptographic hash function and public key cryptography. The scheme proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

Research paper thumbnail of A METHOD FOR CONSTRUCTING DIGITAL SIGNATURE SCHEMES BASED ON NEW HARD PROBLEM ON THE ELLIPTIC CURVE

Journal of Science and Technique , 2023

In this paper, the authors propose a solution to improve the secure of digital signature schemes,... more In this paper, the authors propose a solution to improve the secure of digital signature schemes, this solution is implemented on two levels of digital signature scheme construction. At the first level, the authors propose a new hard problem, this hard problem belongs to the class of hard problems for which there is currently no solution (except by "brute force attack" method). At the second level, the authors propose a method to construct new digital signature algorithms based on this hard problem.

Research paper thumbnail of A PUBLIC KEY ENCRYPTION -AUTHENTICATION SCHEME BASED ON ELGAMAL CRYPTOGRAPHIC ALGORITHM

Journal of Science and Technique - ISSN 1859-0209, 2023

The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This schem... more The article proposes a public-key cryptographic scheme based on the ElGamal algorithm. This scheme can perform security functions and authenticate the origin and integrity of the encrypted message simultaneously. Moreover, the proposed scheme is also used as the basis for developing an algorithm to establish a shared secret key for symmetric key cryptosystems.

Research paper thumbnail of A NEW METHOD FOR CONSTRUCTING DIGITAL SIGNATURE SCHEME BASED ON NEW HARD PROBLEM

Journal of Science and Technique - ISSN 1859-0209, 2022

Research in the field of public key cryptography in general and digital signatures in particular ... more Research in the field of public key cryptography in general and digital signatures in particular is often considered and evaluated at two levels: The first level is considering the mathematical basis for constructing cryptographic and digital signature algorithms, especially these difficult problems: factorizing a large integer into prime factors, finding root problem, discrete logarithm problem, discrete logarithm problem on elliptic curve... The second level is constructing cryptographic and digital signatures algorithms on these hard problems including RSA, DSA, Schnorr, GOST R34.10-94. At the first level, research focuses mainly on improving algorithms for finding large primes, structures for strong primes and algorithms to attack these problems efficiently. At the second level, the research concentrates on improving the existing algorithms to enhance the safety or effective performance of the algorithm. In this article, the authors propose a solution to improve the security of digital signature schemes, implemented in both levels of digital signatures. At the first level, the authors propose a new hard problem-different from the hard problems used before and hasn't been solved by anyone so far (except by "brute force attack" method). At the second level, the authors propose a method to construct new digital signature algorithms that can help create not only one but also a family of new digital signature algorithms with high security level for practical applications. Index terms Digital signature, digital signature scheme, discrete logarithm problem, dinding root problem, discrete logarithm combining finding root problem.

Research paper thumbnail of SOME VARIANTS OF THE SCHNORR SIGNATURE SCHEMA ON THE FINITE FIELD AND THE ELLIPTIC CURVE

Journal of Science and Technique - ISSN 1859-0209, 2022

Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schema... more Schnorr signature schemas and the version on its elliptic curve (EC-Schnorr) are signature schemas that are not only highly secure but are also rated as having the highest performance among signature schemas based on discrete logarithm problems (on the F p finite field and on the elliptic curve). The Schnorr and EC-Schnorr schemas have been incorporated into ISO/IEC 14888-3 and the BSI standard of the Federal Republic of Germany. Currently, the development of signature schemas based on Schnorr and EC-Schnorr schemas for BlockChain applications and digital currencies is of great interest. In this article the authors suggest several variations of the Schnorr schema on the finite field and the elliptic curve. The analyses in the article shows that the new schemas proposed here have the same security and performance as the Schnorr/EC-Schnorr signature schema in practical applications.

Research paper thumbnail of A NEW CONSTRUCTION METHOD OF DIGITAL SIGNATURE SCHEME BASED ON THE DISCRETE LOGARITHM COMBINING FIND ROOT PROBLEM ON THE FINITE FIELD

Journal of Military Science and Technology, Special issue No.6, 12- 2022, 2022

The article proposes a method to build a signature scheme based on a new hard problem, called the... more The article proposes a method to build a signature scheme based on a new hard problem, called the logarithm problem with roots on the finite field. Now, this is a hard problem belonging to the class of unsolvable problems, except for the "brute force" method. Therefore, building a digital signature scheme based on the difficulty of this problem will most likely allow improving the security of the digital signature algorithm according to the proposed new method. In addition, the method of building signature schema here can be applied to develop a class of signature algorithms suitable for applications with high requirements for security in practice applications.

Research paper thumbnail of A METHOD FOR CONSTRUCTING PUBLIC-KEY BLOCK CIPHER SCHEMES BASED ON ELLIPTIC CURVES

Journal of Military Science and Technology, Special issue No.6, 12- 2022, 2022

The article proposes a method for constructing public-key block cipher schemes based on the diffi... more The article proposes a method for constructing public-key block cipher schemes based on the difficulty of the discrete logarithm problem on elliptic curves. The schemas are construc according to the proposed method and can simultaneously perform security functions and authenticate the origin and integrity of the encrypted message. In addition, a shared secret key is established between the sender/encryptor and the receiver/decryptor for each encrypted message based on public key cryptography which also improves the security of these cipher schemes.

Research paper thumbnail of GIAO THỨC TRAO ĐỔI KHÓA AN TOÀN, HIỆU QUẢ CHO CÁC HỆ MẬT KHÓA ĐỐI XỨNG

Journal of Military Science and Technology, 2020

Bài báo đề xuất xây dựng giao thức trao đổi khóa an toàn cho các hệ mật khóa đối xứng phát triển ... more Bài báo đề xuất xây dựng giao thức trao đổi khóa an toàn cho các hệ mật khóa đối xứng phát triển từ giao thức Diffie-Hellman. Giao thức mới đề xuất không sử dụng chữ ký số cho việc xác thực như các giao thức đã được phát triển trước đó, nhờ đó đã nâng cao được hiệu quả thực hiện của thuật toán, song vẫn bảo đảm đầy đủ các tính chất của một giao thức trao đổi khóa an toàn.

Research paper thumbnail of MỘT GIẢI PHÁP XÂY DỰNG HỆ MẬT KHÓA ĐỐI XỨNG

Tạp chí AN TOÀN THÔNG TIN, 2020

Research paper thumbnail of A HIGH-PERFORMANCE AUTHENTICATION-ENCRYPTION SCHEME

Journal of Science and Technique - ISSN 1859-0209, 2022

This paper proposes an encryption scheme that enables verifying the source and integrity of the e... more This paper proposes an encryption scheme that enables verifying the source and integrity of the encrypted message. Additionally, the proposed scheme generates a secret key which is shared between the sender/encryptor and the receiver/decryptor for each encrypted message using public key cryptography.

Research paper thumbnail of THUẬT TOÁN MÃ HÓA - XÁC THỰC THÔNG TIN PHÁT TRIỂN TỪ MẬT MÃ OTP

Journal of Military Science and Technology, 2020

Bài báo đề xuất thuật toán mã hóa – xác thực thông tin từ việc phát triển mật mã sử dụng khóa một... more Bài báo đề xuất thuật toán mã hóa – xác thực thông tin từ việc phát triển mật mã sử dụng khóa một lần - OTP (One - Time Pad). Ưu điểm của thuật toán mới đề xuất là có tính an toàn và hiệu quả thực hiện cao tương tự OTP, đồng thời việc thiết lập, quản lý - phân phối và sử dụng khóa hoàn toàn giống như các hệ mã khóa đối xứng đang được ứng dụng trong thực tế (DES, AES…).

Research paper thumbnail of GIAO THỨC TRAO ĐỔI KHÓA AN TOÀN CHO CÁC HỆ MẬT KHÓA ĐỐI XỨNG

FAIR - NGHIÊN CỨU CƠ BẢN VÀ ỨNG DỤNG CÔNG NGHỆ THÔNG TIN - 2017, Aug 17, 2017

Bài báo đề xuất xây dựng giao thức thỏa thuận khóa an toàn cho các hệ mật mã khóa đối xứng phát t... more Bài báo đề xuất xây dựng giao thức thỏa thuận khóa an toàn cho các hệ mật mã khóa đối xứng phát triển từ giao thức Diffie-Hellman. Các giao thức mới đề xuất có ưu điểm là các khóa bí mật chia sẻ tạo ra được xác thực về nguồn gốc nên có thể chống lại các kiểu tấn công giả mạo rất hiệu quả.

Research paper thumbnail of VARIANT OF OTP CIPHER WITH SYMMETRIC KEY SOLUTION

Journal of Science and Technique - Section on Information and Communication Technology: Vol. 9 No. 02 (2020)., 2020

The paper proposes a solution to construct symmetric-key cryptographic algorithms based on OTP ci... more The paper proposes a solution to construct symmetric-key cryptographic algorithms based on OTP cipher developed based on the cipher One-Time Pad (OTP). Advantages of the algorithms built according to the proposed new solution is to have secure and efficient implementation as OTP cipher, but the establishment, management-distribution and usage of keys are exactly the same as the Symmetric key cryptosystems in practice (DES, AES,.. .).

Research paper thumbnail of A SOLUTION FOR CONSTRUCTING QUANTUM - RESISTANT DIGITAL SIGNATURE SCHEMES

In this article, the author proposes a solution for constructing quantum-resistant digital signat... more In this article, the author proposes a solution for constructing quantum-resistant digital signature schemes based on the new hard problems, which belongs to the group of unsolvable problems. Therefore, the algorithms constructed according to the solution proposed here can be resistant to quantum attacks based on the quantum algorithm proposed by P. Shor [1]. In addition to quantum resistance, these signature schemes proposed here can also be used as pre-quantum digital signature schemes that are widely used in current practical applications.

Research paper thumbnail of THE POST QUANTUM DIGITAL SIGNATURE SCHEMES BASED ON NEW HARD PROBLEM

In addition to quantum resistance, the signature schemes proposed here can also be used as pre-qu... more In addition to quantum resistance, the signature schemes proposed here can also be used as pre-quantum digital signature schemes that are widely used in current practical applications.

Research paper thumbnail of A NEW TYPE OF POST - QUANTUM DIGITAL SIGNATURE SCHEME

In addition to quantum resistance, the signature schemes proposed here can also be used as pre-qu... more In addition to quantum resistance, the signature schemes proposed here can also be used as pre-quantum digital signature schemes that are widely used in current practical applications.

Research paper thumbnail of THE POST - QUANTUM AND PUBLIC - KEY BLOCK CIPHER ALGORITHMS BASED ON C.E.SHANNON'S THEORY OF PERFECT SECRECY

Research paper thumbnail of THE SOLUTION FOR CONSTRUCTING POST – QUANTUM CRYPTOGRAPHIC ALGORITHMS BASED ON C.E.SHANNON’S THEORY OF PERFECT SECRECY

https://www.researchgate.net/profile/Luu-Dung-5, 2021

We welcome contributions to the PHANTOM project. Please fork the repository and submit pull reque... more We welcome contributions to the PHANTOM project. Please fork the repository and submit pull requests for review: https://github.com/test-sum/phantom-encryption-crypto/

Research paper thumbnail of A TYPE OF POST - QUANTUM CRYPTOGRAPHIC ALGORITHM

Research paper thumbnail of THE PUBLIC-KEY BLOCK CIPHER ALGORITHMS

https://www.researchgate.net/profile/Luu-Dung-5/research, 2022

The paper proposes a type of block cipher algorithm based on cryptographic hash function and publ... more The paper proposes a type of block cipher algorithm based on cryptographic hash function and public key cryptography. The algorithm proposed here is capable of verifying the origin and integrity of the encrypted message. On the other hand, establishing a shared secret key between the sender/encryptor and the receiver/decryptor can be done for each message separately.

Research paper thumbnail of THE POST - QUANTUM CRYPTOGRAPHIC ALGORITHMS BASED ON OTP CIPHER AND HASH FUNCTIONS

https://www.researchgate.net/profile/Luu-Dung-5/research, 2021

We welcome contributions to the PHANTOM project. Please fork the repository and submit pull reque... more We welcome contributions to the PHANTOM project. Please fork the repository and submit pull requests for review: https://github.com/test-sum/phantom-encryption-crypto/

Research paper thumbnail of MỘT DẠNG THUẬT TOÁN MẬT MÃ KHÁNG LƯỢNG TỬ

Research paper thumbnail of MỘT DẠNG LƯỢC ĐỒ CHỮ KÝ KHÁNG LƯỢNG TỬ

Research paper thumbnail of LƯỢC ĐỒ CHỮ KÝ KHÁNG LƯỢNG TỬ XÂY DỰNG TRÊN MỘT DẠNG BÀI TOÁN KHÓ MỚI