Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

被引:0
|
作者
Z. Lipiński
机构
[1] University of Opole,
关键词
Non-associative cryptography; Octonion cryptography; Octavian totient function; Octonion RSA algorithm; Quaternion cryptography; 68P25; 94A60; 11T71;
D O I
暂无
中图分类号
学科分类号
摘要
We propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
引用
收藏
页码:81 / 96
页数:15
相关论文
共 50 条
  • [1] Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
    Lipinski, Z.
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2021, 32 (01) : 81 - 96
  • [2] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [3] Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure
    Luo, Shoufu
    Seideman, Jeremy D.
    Dietrich, Sven
    [J]. 2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2018), 2018, : 170 - 179
  • [4] Computational Soundness for Key Exchange Protocols with Symmetric Encryption
    Kuesters, Ralf
    Tuengerthal, Max
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 91 - 100
  • [5] Algebra model and security analysis for cryptographic protocols
    HUAI Jinpeng & LI Xianxian School of Computer
    [J]. Science China(Information Sciences), 2004, (02) : 199 - 220
  • [6] Algebra model and security analysis for cryptographic protocols
    Huai, JP
    Li, XX
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2004, 47 (02): : 199 - 220
  • [7] Algebra model and security analysis for cryptographic protocols
    Jinpeng Huai
    Xianxian Li
    [J]. Science in China Series F: Information Sciences, 2004, 47 : 199 - 220
  • [8] Types and effects for asymmetric cryptographic protocols
    Gordon, AD
    Jeffrey, A
    [J]. 15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS, 2002, : 77 - 91
  • [9] Symmetric cryptographic protocols for extended millionaires' problem
    Li ShunDong
    Wang DaoShun
    Dai YiQi
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (06): : 974 - 982
  • [10] Symmetric cryptographic protocols for extended millionaires’ problem
    LI ShunDong WANG DaoShun DAI YiQi School of Computer Science Shaanxi Normal University Xian China Department of Computer Science and Technology Tsinghua University Beijing China
    [J]. Science in China(Series F:Information Sciences), 2009, 52 (06) : 974 - 982