Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra

被引:0
|
作者
Z. Lipiński
机构
[1] University of Opole,
关键词
Non-associative cryptography; Octonion cryptography; Octavian totient function; Octonion RSA algorithm; Quaternion cryptography; 68P25; 94A60; 11T71;
D O I
暂无
中图分类号
学科分类号
摘要
We propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
引用
收藏
页码:81 / 96
页数:15
相关论文
共 50 条
  • [21] On cryptographic protocols employing asymmetric pairings - The role of Ψ revisited
    Chatterjee, Sanjit
    Menezes, Alfred
    [J]. DISCRETE APPLIED MATHEMATICS, 2011, 159 (13) : 1311 - 1322
  • [22] Logic for verifying public-key cryptographic protocols
    Coffey, T
    Saidha, P
    [J]. IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1997, 144 (01): : 28 - 32
  • [23] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION
    Nema, Preksha
    Rizvi, M. A.
    [J]. 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
  • [24] Classical and Physical Security of Symmetric Key Cryptographic Algorithms
    Baksi, Anubhab
    [J]. PROCEEDINGS OF THE 2021 IFIP/IEEE INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION (VLSI-SOC), 2021, : 186 - 187
  • [25] Efficient key management methods for symmetric cryptographic algorithm
    Sreehari, K. N.
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC 2018), 2018, : 377 - 380
  • [26] Cryptographic key exchange based on locationing information
    Naik, Piyush
    Ravichandran, Karthikeyan
    Sivalingam, Krishna M.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2007, 3 (01) : 15 - 35
  • [27] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [28] An Approach to Cryptographic Key Exchange Using Fingerprint
    Barman, Subhas
    Chattopadhyay, Samiran
    Samanta, Debasis
    [J]. SECURITY IN COMPUTING AND COMMUNICATIONS, 2014, 467 : 162 - 172
  • [29] A New Hybrid Asymmetric Key-Exchange and Visual Cryptographic Algorithm tor Securing Digital Images
    Kester, Quist-Aphetsi
    Nana, Laurent
    Pascu, Anca Christine
    [J]. 2013 5TH INTERNATIONAL CONFERENCE ON ADAPTIVE SCIENCE AND TECHNOLOGY (ICAST 2013), 2013,
  • [30] Controlling the key by choosing the detection bits in quantum cryptographic protocols
    LIU Bin
    GAO Fei
    HUANG Wei
    LI Dan
    WEN QiaoYan
    [J]. Science China(Information Sciences), 2015, 58 (11) : 200 - 210