Publication Cover
PRIMUS
Problems, Resources, and Issues in Mathematics Undergraduate Studies
Volume 34, 2024 - Issue 1: Resources for Undergraduate Cryptology
83
Views
0
CrossRef citations to date
0
Altmetric
Research Articles

Alkaline: A Simplified Post-Quantum Encryption Algorithm for Classroom Use

REFERENCES

  • Alagic, G., D. Apon, D. Cooper, Q. Dang, T. Dang, J. Kelsey, J. Lichtinger, C. Miller, D. Moody, R. Peralta, R. Perlner, A. Robinson, D. Smith-Tone, and Y. Liu. 2022. Status report on the third round of the NIST post-quantum cryptography standardization process. Technical Report NIST IR 8413-upd1, National Institute of Standards and Technology.
  • Avanzi, R., J. Bos, L. Ducas, E. Kiltz, T. Lepoint, V. Lyubashevsky, J. M. Schanck, P. Schwabe, G. Seiler, and D. Stehlé. (2021, August 4). Algorithm specifications and supporting documentation. Technical Report (Version 3.02), National Institute of Standards and Technology.
  • Chen, L., S. Jordan, Y. Liu, D. Moody, R. Peralta, R. Perlner, and D. Smith-Tone. 2016. Report on post-quantum cryptography. Technical Report NIST IR 8105, National Institute of Standards and Technology.
  • Cohen, H. 1993. A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, Vol. 138. Berlin, Heidelberg: Springer.
  • Daemen, J. and V. Rijmen. (1999, September 3). AES proposal: Rijndael, document version 2, AES proposals. National Institute of Standards and Technology.
  • Ducas, L. and J. Schanck. (2021, January 21). security-estimates/Kyber.py at master · pq-crystals/security-estimates. https://github.com/pq-crystals/security-estimates/blob/master/Kyber.py.
  • Dummit, D. S. and R. M. Foote. 2004. Abstract Algebra. Hoboken, NJ: Wiley.
  • Gentry, C., C. Peikert, and V. Vaikuntanathan. 2008. Trapdoors for hard lattices and new cryptographic constructions. In Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing, pp. 197–206. https://doi.org/10.1145/1374376.1374407.
  • Hoffstein, J., J. Pipher, and J. H. Silverman. 2014. An Introduction to Mathematical Cryptography, Second Edition. Undergraduate Texts in Mathematics. New York, NY: Springer.
  • Holden, J. 2004. A comparison of cryptography courses. Cryptologia. 28(2): 97–111. https://doi.org/10.1080/0161110491892809.
  • Holden, J. 2013. Demitasse: A “small” version of the tiny encryption algorithm and its use in a classroom setting. Cryptologia. 37(1): 74–83. https://doi.org/10.1080/01611194.2012.660237.
  • Holden, J. 2013. A good hash function is hard to find, and vice versa. Cryptologia. 37: 107–119.
  • Holden, J. (2022, September 5). security-estimates/Kyber.py at master · joshuarbholden/security-estimates. https://github.com/joshuarbholden/security-estimates/blob/master/Kyber.py.
  • Holden, J. (2023, January 1). joshuarbholden/alkaline: Alkaline is a toy version of Kyber for classroom use. https://github.com/joshuarbholden/alkaline.
  • Internet Meme Database. (2009, August 26). Aretha's hat. https://knowyourmeme.com/memes/arethas-hat.
  • Internet Meme Database. (2021, January 20). Bernie sanders wearing mittens sitting in a chair. https://knowyourmeme.com/memes/bernie-sanders-wearing-mittens-sitting-in-a-chair.
  • Lyubashevsky, V., C. Peikert, and O. Regev. 2010. On ideal lattices and learning with errors over rings. In Advances in Cryptology – EUROCRYPT 2010, pp. 1–23. https://doi.org/10.1007/978-3-642-13190-51.
  • Musa, M. A., E. F. Schaefer, and S. Wedig. 2003. A simplified AES algorithm and its linear and differential cryptanalyses. Cryptologia. 27(2): 148–177. https://doi.org/10.1080/0161-110391891838.
  • Regev, O. 2005. On lattices, learning with errors, random linear codes, and cryptography. In Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 84–93. https://doi.org/10.1145/1060590.1060603.
  • The Sage Developers. 2021. Sagemath, the Sage Mathematics Software System (Version 9.3). https://www.sagemath.org.
  • Schaefer, E. F. 1996. A simplified data encryption standard algorithm. Cryptologia. 20(1): 77–84. https://doi.org/10.1080/0161-119691884799.
  • Stinson, D. R. and M. Paterson. 2018. Cryptography: Theory and Practice, Fourth Edition. Boca Raton, FL: Chapman and Hall/CRC.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.