Complete Decompositions of Dihedral Groups and Group Based Key Exchange Protocol
نویسندگان
چکیده
This research is about the group coverings of subsets finite non-abelian groups and its application in field cryptography. Group abelian has been researched over years it many applications various fields. The popularity internet increased rapidly cryptography become more important as ensures privacy security users network. A cryptosystem a structure consisting several cryptographic primitives. Key exchange protocol one primitives that parties used to shared key. covering we investigate this paper complete decompositions order t dihedral group. Let D2n be 2 for positive integer n≥3. We show some constructions t∈{2,3,…,n}. Since group, hardness mathematical problems will designing secure cryptosystem. By using computational decomposition search problem, two key proposed without sharing any keys directly. Finally, scheme communication between authorized protect data from being disclosed third or hackers.
منابع مشابه
Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups
Author: Ayan Mahalanobis Title: Diffie-Hellman Key Exchange Protocol, its Generalization and Nilpotent Groups Dissertation Advisor: Dr. Spyros Magliveras Degree: Doctor of Philosophy Year: 2005 This dissertation has two chapters. In the first chapter we talk about the discrete logarithm problem, more specifically we concentrate on the Diffie-Hellman key exchange protocol. We survey the current ...
متن کاملDiffie-Hellman key exchange protocol and non-abelian nilpotent groups
In this paper we study a key exchange protocol similar to DiffieHellman key exchange protocol using abelian subgroups of the automorphism group of a non-abelian nilpotent group. We also generalize group no.92 of HallSenior table [15], for arbitrary prime p and show that for those groups, the group of central automorphisms commute. We use these for the key exchange we are studying. MSC: 94A62, 2...
متن کاملThe Complete cd-Index of Dihedral and Universal Coxeter Groups
We present a description, including a characterization, of the complete cd-index of dihedral intervals. Furthermore, we describe a method to compute the complete cd-index of intervals in universal Coxeter groups. To obtain such descriptions, we consider Bruhat intervals for which Björner and Wachs’s CL-labeling can be extended to paths of different lengths in the Bruhat graph. While such an ext...
متن کاملCryptanalysis of Tseng-Wu Group Key Exchange Protocol
Recently, Tseng and Wu pointed out that the second protocol of Biswas’s two-party keys scheme based on the Diffie-Hellman technique has a security weakness and proposed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu’s protocol is vulnerable to a man-in-the-middle attack. An attacker could intercept, delete, or modify the communicated messages between two comm...
متن کاملIBAKE: Identity-Based Authenticated Key Exchange Protocol
The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of attention, motivated mainly by the desire to eliminate the need for large-scale public key infrastructure. We follow this trend in this work, by introducing a new Identity-Based Authenticated Key Excha...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Kejuruteraan
سال: 2021
ISSN: ['2289-7526', '0128-0198']
DOI: https://doi.org/10.17576/jkukm-2021-33(3)-31