Quaternion Public Key Cryptosystems

被引:0
|
作者
Valluri, Maheswara Rao [1 ]
Narayan, Shailendra Vikash [1 ]
机构
[1] Fiji Natl Univ, Sch Math & Comp Sci, POB 7222,Derrick Campus, Suva, Fiji
关键词
Brute force attack; key exchange; public key cryptosystem; quaternion hidden conjugacy search problem; quaternion ring; DISCRETE LOGARITHMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings modulo prime, p. Also, the performance and the security related issues of the proposals have been discussed.
引用
收藏
页码:48 / 51
页数:4
相关论文
共 50 条
  • [31] Public key cryptosystems based on drinfeld modules are insecure
    Scanlon, T
    JOURNAL OF CRYPTOLOGY, 2001, 14 (04) : 225 - 230
  • [32] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [33] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [34] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [35] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 1 - +
  • [36] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141
  • [37] Secure evolvable hardware for public-key cryptosystems
    Nadia Nedjah
    Luiza de Macedo Mourelle
    New Generation Computing, 2005, 23 : 259 - 275
  • [38] Digital signatures and public key cryptosystems with multilayer perceptrons
    Yee, LP
    De Silva, LC
    ICONIP'02: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING: COMPUTATIONAL INTELLIGENCE FOR THE E-AGE, 2002, : 2308 - 2311
  • [39] Software Implementation of a Pairing Function for Public Key Cryptosystems
    Kanbara, Yusuke
    Teruya, Tadanori
    Kanayama, Naoki
    Nishide, Takashi
    Okamoto, Eiji
    2015 5TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2015,
  • [40] Fault Analysis Detection in Public Key Cryptosystems (RSA)
    Mamathashree, A. M.
    Remya, K.
    Kumar, Santhosh B. J.
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), 2017, : 505 - 508