Digital Repository of Luhansk Taras Shevchenko National University

Maximality of affine group, and hidden graph cryptosystems

Show simple item record

dc.contributor.author Ustimenko, Vasiliy A.
dc.date.accessioned 2015-11-11T14:30:20Z
dc.date.available 2015-11-11T14:30:20Z
dc.date.issued 2005
dc.identifier.uri http://hdl.handle.net/123456789/152
dc.description.abstract We describe a new algebraic-combinatorial method of public key encryption with a certain similarity to the well known Imai-Matsumoto. We use the general idea to treat vertices of a linguistic graph (see [21] and further references) as messages and use the iterative process to walk on such graph as encryption process. To hide such encryption (graph and walk on it) we will use two affine transformation. Like in Imai Matsumoto encryption the public rule is just a direct polynomial map from the plaintext to the ciphertext. The knowledge about graph and chosen walk on them (the key) allow to decrypt a ciphertext fast. We hope that the system is secure even in the case when the graph is Public but the walk is hidden. In case of "public" graph we can use same encryption as private key algorithm with the resistance to attacks when adversary knows several pairs:(plaintext, ciphertext). We shall discuss the general idea of combining affine transformations and chosen polynomial map of deg 2 in case of prime field Fp. As it follows from the maximality of affine group each bijection on Fp n can be obtained by such combining. uk_UA
dc.language.iso en uk_UA
dc.publisher Луганский национальный университет им. Т. Шевченко uk_UA
dc.subject алгебра uk_UA
dc.title Maximality of affine group, and hidden graph cryptosystems uk_UA
dc.title.alternative Dedicated to Yu.A. Drozd on the occasion of his 60th birthday uk_UA
dc.type Article uk_UA


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account