Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring

<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of...

Full description

Saved in:
Bibliographic Details
Main Author: Muzna Yumman (16494023) (author)
Other Authors: Tariq Shah (408879) (author), Iqtadar Hussain (14147850) (author)
Published: 2020
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. Despite the matrix algebra M(k,Z<sub>n</sub>), the matrix algebra <em>M (k, R′ₙ), R′ₙ</em>  =  (Z₂[w])/(wⁿ-1) as the chain ring is considered. In this technique, instead of exponentiation, the inner product automorphisms the use for key generation. The chain ring provides computational complexity to its algorithm, which improves the strength of the cryptosystem. However, the residue ring endangers the security of the original cryptosystem, while it is hard to break using R′ₙ . The structure of the chain ring deals with the binary field Z<sub>2</sub>, which simplifies its calculation and makes it capable of efficient execution in various application. </p> <h2>Other Information</h2> <p>Published in: Symmetry<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.3390/sym13010045" target="_blank">http://dx.doi.org/10.3390/sym13010045 </a></p>