Symmetric and Asymmetric Cryptography on the Special Linear Cracovian Quasigroup

被引:1
|
作者
Lipinski, Zbigniew [1 ]
Mizera-Pietraszko, Jolanta [2 ]
机构
[1] Univ Opole, Opole, Poland
[2] Mil Univ Land Forces, Wroclaw, Poland
关键词
Non-commutative cryptography; Cracovian quasigroup; Totient function for matrices;
D O I
10.1007/978-3-031-21967-2_52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose symmetric and public key cryptographic protocols on the non-associative special linear Cracovian quasigroup. The SLn(Z) Cracovian quasigroup is the set of n x n matrices with determinant one and entries in the ring of integers Z with the non-associative multiplication. The strength of the proposed symmetric cipher is based on the NP-hardness of the non-negative matrix factorization problem. We define the totient function for a given matrix from the special linear group over the ring Z/mZ of integers modulo m as the order of a cyclic subgroup generated by this matrix. Defined in this way totient function allows us to construct the public key cryptographic protocol on the special linear group SLn(Z(m)) and generalize it to the Cracovian quasigroup.
引用
收藏
页码:643 / 655
页数:13
相关论文
共 50 条
  • [1] Quantum asymmetric cryptography with symmetric keys
    Fei Gao
    QiaoYan Wen
    SuJuan Qin
    FuChen Zhu
    Science in China Series G: Physics, Mechanics and Astronomy, 2009, 52 : 1925 - 1931
  • [2] Quantum asymmetric cryptography with symmetric keys
    Gao Fei
    Wen QiaoYan
    Qin SuJuan
    Zhu FuChen
    SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2009, 52 (12): : 1925 - 1931
  • [3] Multilayer symmetric and asymmetric technique for audiovisual cryptography
    Parekh, Aryan
    Antani, Mayav
    Suvarna, Kartik
    Mangrulkar, Ramchandra
    Narvekar, Meera
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (11) : 31465 - 31503
  • [4] A comparative survey of symmetric and asymmetric key cryptography
    Chandra, Sourabh
    Paira, Smita
    Alam, Sk Safikul
    Sanyal, Goutam
    2014 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATION AND COMPUTATIONAL ENGINEERING (ICECCE), 2014, : 83 - 93
  • [5] Multilayer symmetric and asymmetric technique for audiovisual cryptography
    Aryan Parekh
    Mayav Antani
    Kartik Suvarna
    Ramchandra Mangrulkar
    Meera Narvekar
    Multimedia Tools and Applications, 2024, 83 : 31465 - 31503
  • [6] CNOT extraction attack on "quantum asymmetric cryptography with symmetric keys"
    Lin Ching-Ying
    Hwang, Tzonelih
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2014, 57 (05) : 1001 - 1003
  • [7] CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”
    Ching-Ying Lin
    Tzonelih Hwang
    Science China Physics, Mechanics & Astronomy, 2014, 57 : 1001 - 1003
  • [8] CNOT extraction attack on “quantum asymmetric cryptography with symmetric keys”
    LIN Ching-Ying
    HWANG Tzonelih
    Science China(Physics,Mechanics & Astronomy), 2014, (05) : 1001 - 1003
  • [9] Secure Data Transfer in MANET Using Symmetric and Asymmetric Cryptography
    Kapur, Raj Kamal
    Khatri, Sunil Kumar
    2015 4TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (ICRITO) (TRENDS AND FUTURE DIRECTIONS), 2015,
  • [10] Quasigroup automorphisms and symmetric group characters
    Kerby, Brent
    Smith, Jonathan D. H.
    COMMENTATIONES MATHEMATICAE UNIVERSITATIS CAROLINAE, 2010, 51 (02): : 279 - 286