Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring

<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Muzna Yumman (16494023) (author)
مؤلفون آخرون: Tariq Shah (408879) (author), Iqtadar Hussain (14147850) (author)
منشور في: 2020
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513564181528576
author Muzna Yumman (16494023)
author2 Tariq Shah (408879)
Iqtadar Hussain (14147850)
author2_role author
author
author_facet Muzna Yumman (16494023)
Tariq Shah (408879)
Iqtadar Hussain (14147850)
author_role author
dc.creator.none.fl_str_mv Muzna Yumman (16494023)
Tariq Shah (408879)
Iqtadar Hussain (14147850)
dc.date.none.fl_str_mv 2020-12-30T00:00:00Z
dc.identifier.none.fl_str_mv 10.3390/sym13010045
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Asymmetric_Cryptosystem_on_Matrix_Algebra_over_a_Chain_Ring/23626404
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Theory of computation
Mathematical sciences
asymmetric cryptosystems
chain ring
general linear group
dc.title.none.fl_str_mv Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. Despite the matrix algebra M(k,Z<sub>n</sub>), the matrix algebra <em>M (k, R′ₙ), R′ₙ</em>  =  (Z₂[w])/(wⁿ-1) as the chain ring is considered. In this technique, instead of exponentiation, the inner product automorphisms the use for key generation. The chain ring provides computational complexity to its algorithm, which improves the strength of the cryptosystem. However, the residue ring endangers the security of the original cryptosystem, while it is hard to break using R′ₙ . The structure of the chain ring deals with the binary field Z<sub>2</sub>, which simplifies its calculation and makes it capable of efficient execution in various application. </p> <h2>Other Information</h2> <p>Published in: Symmetry<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.3390/sym13010045" target="_blank">http://dx.doi.org/10.3390/sym13010045 </a></p>
eu_rights_str_mv openAccess
id Manara2_b7dff548fc6efc718ed6b918470d11b3
identifier_str_mv 10.3390/sym13010045
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/23626404
publishDate 2020
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Asymmetric Cryptosystem on Matrix Algebra over a Chain RingMuzna Yumman (16494023)Tariq Shah (408879)Iqtadar Hussain (14147850)Information and computing sciencesCybersecurity and privacyDistributed computing and systems softwareTheory of computationMathematical sciencesasymmetric cryptosystemschain ringgeneral linear group<p>The revolutionary idea of asymmetric cryptography brings a fundamental change to our modern communication system. However, advances in quantum computers endanger the security of many asymmetric cryptosystems based on the hardness of factoring and discrete logarithm, while the complexity of the quantum algorithm makes it hard to implement in many applications. In this respect, novel asymmetric cryptosystems based on matrices over residue rings are in practice. In this article, a novel approach is introduced. Despite the matrix algebra M(k,Z<sub>n</sub>), the matrix algebra <em>M (k, R′ₙ), R′ₙ</em>  =  (Z₂[w])/(wⁿ-1) as the chain ring is considered. In this technique, instead of exponentiation, the inner product automorphisms the use for key generation. The chain ring provides computational complexity to its algorithm, which improves the strength of the cryptosystem. However, the residue ring endangers the security of the original cryptosystem, while it is hard to break using R′ₙ . The structure of the chain ring deals with the binary field Z<sub>2</sub>, which simplifies its calculation and makes it capable of efficient execution in various application. </p> <h2>Other Information</h2> <p>Published in: Symmetry<br> License: <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br> See article on publisher's website: <a href="http://dx.doi.org/10.3390/sym13010045" target="_blank">http://dx.doi.org/10.3390/sym13010045 </a></p>2020-12-30T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.3390/sym13010045https://figshare.com/articles/journal_contribution/Asymmetric_Cryptosystem_on_Matrix_Algebra_over_a_Chain_Ring/23626404CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/236264042020-12-30T00:00:00Z
spellingShingle Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
Muzna Yumman (16494023)
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Theory of computation
Mathematical sciences
asymmetric cryptosystems
chain ring
general linear group
status_str publishedVersion
title Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
title_full Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
title_fullStr Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
title_full_unstemmed Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
title_short Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
title_sort Asymmetric Cryptosystem on Matrix Algebra over a Chain Ring
topic Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Theory of computation
Mathematical sciences
asymmetric cryptosystems
chain ring
general linear group