Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 3

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  cryptosystems
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Noncommutative cryptography is based on applications of algebraic structures like noncommutative groups,semigroups, and noncommutative rings. Its intersection withMultivariate cryptography contains studies of cryptographicapplications of subsemigroups and subgroups of affine Cremona semigroups defined over finite commutative rings. Efficientlycomputed homomorphisms between stable subsemigroups of affine Cremona semigroups can be used in tame homomorphisms protocols schemes and their inverse versions. The implementationscheme with the sequence of subgroups of affine Cremona group that defines the projective limit was already suggested. We present the implementation of another scheme that uses two projective limits which define two different infinite groups and the homomorphism between them. The security of the corresponding algorithm is based on complexity of the decomposition problem for an element of affine Cremona semigroup into a product of given generators. These algorithms may be used in postquantum technologies.
EN
Families of edge transitive algebraic graphs defined over finite commutative rings were used for the development of stream ciphers, public key cryptosystems and key exchange protocols. We present the results of the first implementation of a public key algorithm based on the family of algebraic graphs, which are not edge transitive. The absence of an edge transitive group of symmetries means that the algorithm can not be described in group theoretical terms. We hope that it licates cryptanalysis of the algorithm. We discuss the connections between the security of algorithms and the discrete logarithm problem.The plainspace of the algorithm is Kn, where K is the chosen commutative ring. The graph theoretical encryption corresponds to walk on the bipartite graph with the partition sets which are isomorphic to Kn. We conjugate the chosen graph based encryption map, which is a composition of several elementary cubical polynomial automorphisms of a free module Kn with special invertible affine transformation of Kn. Finally we compute symbolically the corresponding cubic public map g of Kn onto Kn. We evaluate time for the generation of g, and the number of monomial expression in the list of corresponding public rules.
3
Content available remote On the application of discrete chaotic systems to cryptography : DCC method
EN
In the paper we present some methods of constructing cryptosystems utilising chaotic dynamical systems that have been extensively developed last years. We start with a brief review of algorithms based on both the theory of continuous and discrete systems. Then we show our approach where the essence of chaos (that is the sensitivity of the trajectories of discrete chaotic dynamical systems to the small changes of initial conditions) is exploited for secure communication.
PL
Praca poświęcona jest omówieniu metod intensywnie rozwijanych w ostatnich latach, dotyczących konstruowania kryptosystemów wykorzystujących teorię chaotycznych układów dynamicznych. W zwięzły sposób przedstawiono w niej najnowsze algorytmy tego typu oparte zarówno na ciągłych, jak też na dyskretnych układach dynamicznych. Następnie zaprezentowano własne podejście do tego zagadnienia, w którym podstawą algorytmu jest teoria dyskretnych układów chaotycznych. Jego istotą jest silne uwzględnienie w algorytmie najważniejszej własności trajektorii chaotycznych, to znaczy ich wykładniczej wrażliwości na małe zmiany warunków początkowych.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.