Symmetric and Asymmetric Cryptography on the Special Linear Cracovian Quasigroup

被引:1
|
作者
Lipinski, Zbigniew [1 ]
Mizera-Pietraszko, Jolanta [2 ]
机构
[1] Univ Opole, Opole, Poland
[2] Mil Univ Land Forces, Wroclaw, Poland
关键词
Non-commutative cryptography; Cracovian quasigroup; Totient function for matrices;
D O I
10.1007/978-3-031-21967-2_52
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We propose symmetric and public key cryptographic protocols on the non-associative special linear Cracovian quasigroup. The SLn(Z) Cracovian quasigroup is the set of n x n matrices with determinant one and entries in the ring of integers Z with the non-associative multiplication. The strength of the proposed symmetric cipher is based on the NP-hardness of the non-negative matrix factorization problem. We define the totient function for a given matrix from the special linear group over the ring Z/mZ of integers modulo m as the order of a cyclic subgroup generated by this matrix. Defined in this way totient function allows us to construct the public key cryptographic protocol on the special linear group SLn(Z(m)) and generalize it to the Cracovian quasigroup.
引用
收藏
页码:643 / 655
页数:13
相关论文
共 50 条
  • [41] Special Issue on Coding and Cryptography
    Charpin, P
    Kabatianski, G
    DISCRETE APPLIED MATHEMATICS, 2006, 154 (02) : 173 - 173
  • [42] Special Issue: Coding and Cryptography
    Parker, Matthew Geoffrey
    Kholosha, Sasha
    Charpin, Pascale
    Rosnes, Eirik
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 59 (1-3) : 1 - 1
  • [43] SPECIAL ISSUE ON CRYPTOGRAPHY - PREFACE
    GALIL, Z
    SIAM JOURNAL ON COMPUTING, 1988, 17 (02) : R5 - R7
  • [44] Special Issue on Coding and Cryptography
    Augot, Daniel
    Canteaut, Anne
    Kyureghyan, Gohar
    Solov'eva, Faina I.
    Ytrehus, Oyvind
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 66 (1-3) : 1 - 2
  • [45] Graphs with special arcs and cryptography
    Ustimenko, VA
    ACTA APPLICANDAE MATHEMATICAE, 2002, 74 (02) : 117 - 153
  • [46] Nearly a special issue on cryptography
    Schumny, H
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (05) : 375 - 376
  • [47] Special issue on cryptography and security
    Mazzeo, A
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 343 - 345
  • [48] Optical asymmetric cryptography based on elliptical polarized light linear truncation and a numerical reconstruction technique
    Lin, Chao
    Shen, Xueju
    Wang, Zhisong
    Zhao, Cheng
    APPLIED OPTICS, 2014, 53 (18) : 3920 - 3928
  • [49] SPECIAL ISSUE CRYPTOGRAPHY PREFACE
    Ding, Cunsheng
    Wang, Qi
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2011, 22 (06) : 1241 - 1241
  • [50] Graphs with Special Arcs and Cryptography
    Vasiliy A. Ustimenko
    Acta Applicandae Mathematica, 2002, 74 : 117 - 153