Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | , |
| منشور في: |
2020
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513564181528576 |
|---|---|
| author | Muzna Yumman (16494023) |
| author2 | Tariq Shah (408879) Iqtadar Hussain (14147850) |
| author2_role | author author |
| author_facet | Muzna Yumman (16494023) Tariq Shah (408879) Iqtadar Hussain (14147850) |
| author_role | author |
| dc.creator.none.fl_str_mv | Muzna Yumman (16494023) Tariq Shah (408879) Iqtadar Hussain (14147850) |
| dc.date.none.fl_str_mv | 2020-12-30T00:00:00Z |
| dc.identifier.none.fl_str_mv | 10.3390/sym13010045 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Asymmetric_Cryptosystem_on_Matrix_Algebra_over_a_Chain_Ring/23626404 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Theory of computation Mathematical sciences asymmetric cryptosystems chain ring general linear group |
| dc.title.none.fl_str_mv | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. Despite the matrix algebra M(k,Z<sub>n</sub>), the matrix algebra <em>M (k, R′ₙ), R′ₙ</em> = (Z₂[w])/(wⁿ-1) as the chain ring is considered. In this technique, instead of exponentiation, the inner product automorphisms the use for key generation. The chain ring provides computational complexity to its algorithm, which improves the strength of the cryptosystem. However, the residue ring endangers the security of the original cryptosystem, while it is hard to break using R′ₙ . The structure of the chain ring deals with the binary field Z<sub>2</sub>, which simplifies its calculation and makes it capable of efficient execution in various application. </p> <h2>Other Information</h2> <p>Published in: Symmetry<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.3390/sym13010045" target="_blank">http://dx.doi.org/10.3390/sym13010045 </a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_b7dff548fc6efc718ed6b918470d11b3 |
| identifier_str_mv | 10.3390/sym13010045 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/23626404 |
| publishDate | 2020 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Asymmetric Cryptosystem on Matrix Algebra over a Chain RingMuzna Yumman (16494023)Tariq Shah (408879)Iqtadar Hussain (14147850)Information and computing sciencesCybersecurity and privacyDistributed computing and systems softwareTheory of computationMathematical sciencesasymmetric cryptosystemschain ringgeneral linear group<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. Despite the matrix algebra M(k,Z<sub>n</sub>), the matrix algebra <em>M (k, R′ₙ), R′ₙ</em> = (Z₂[w])/(wⁿ-1) as the chain ring is considered. In this technique, instead of exponentiation, the inner product automorphisms the use for key generation. The chain ring provides computational complexity to its algorithm, which improves the strength of the cryptosystem. However, the residue ring endangers the security of the original cryptosystem, while it is hard to break using R′ₙ . The structure of the chain ring deals with the binary field Z<sub>2</sub>, which simplifies its calculation and makes it capable of efficient execution in various application. </p> <h2>Other Information</h2> <p>Published in: Symmetry<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.3390/sym13010045" target="_blank">http://dx.doi.org/10.3390/sym13010045 </a></p>2020-12-30T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.3390/sym13010045https://figshare.com/articles/journal_contribution/Asymmetric_Cryptosystem_on_Matrix_Algebra_over_a_Chain_Ring/23626404CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/236264042020-12-30T00:00:00Z |
| spellingShingle | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring Muzna Yumman (16494023) Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Theory of computation Mathematical sciences asymmetric cryptosystems chain ring general linear group |
| status_str | publishedVersion |
| title | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| title_full | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| title_fullStr | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| title_full_unstemmed | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| title_short | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| title_sort | Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring |
| topic | Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Theory of computation Mathematical sciences asymmetric cryptosystems chain ring general linear group |