Complete Decompositions of Dihedral Groups and Group Based Key Exchange Protocol

نویسندگان

چکیده

This research is about the group coverings of subsets finite non-abelian groups and its application in field cryptography. Group abelian has been researched over years it many applications various fields. The popularity internet increased rapidly cryptography become more important as ensures privacy security users network. A cryptosystem a structure consisting several cryptographic primitives. Key exchange protocol one primitives that parties used to shared key. covering we investigate this paper complete decompositions order t dihedral group. Let D2n be 2 for positive integer n≥3. We show some constructions t∈{2,3,…,n}. Since group, hardness mathematical problems will designing secure cryptosystem. By using computational decomposition search problem, two key proposed without sharing any keys directly. Finally, scheme communication between authorized protect data from being disclosed third or hackers.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Diffie-Hellman Key Exchange Protocol, Its Generalization and Nilpotent Groups

Author: Ayan Mahalanobis Title: Diffie-Hellman Key Exchange Protocol, its Generalization and Nilpotent Groups Dissertation Advisor: Dr. Spyros Magliveras Degree: Doctor of Philosophy Year: 2005 This dissertation has two chapters. In the first chapter we talk about the discrete logarithm problem, more specifically we concentrate on the Diffie-Hellman key exchange protocol. We survey the current ...

متن کامل

Diffie-Hellman key exchange protocol and non-abelian nilpotent groups

In this paper we study a key exchange protocol similar to DiffieHellman key exchange protocol using abelian subgroups of the automorphism group of a non-abelian nilpotent group. We also generalize group no.92 of HallSenior table [15], for arbitrary prime p and show that for those groups, the group of central automorphisms commute. We use these for the key exchange we are studying. MSC: 94A62, 2...

متن کامل

The Complete cd-Index of Dihedral and Universal Coxeter Groups

We present a description, including a characterization, of the complete cd-index of dihedral intervals. Furthermore, we describe a method to compute the complete cd-index of intervals in universal Coxeter groups. To obtain such descriptions, we consider Bruhat intervals for which Björner and Wachs’s CL-labeling can be extended to paths of different lengths in the Bruhat graph. While such an ext...

متن کامل

Cryptanalysis of Tseng-Wu Group Key Exchange Protocol

Recently, Tseng and Wu pointed out that the second protocol of Biswas’s two-party keys scheme based on the Diffie-Hellman technique has a security weakness and proposed a new protocol to remedy the weakness. In this article, we point out that Tseng-Wu’s protocol is vulnerable to a man-in-the-middle attack. An attacker could intercept, delete, or modify the communicated messages between two comm...

متن کامل

IBAKE: Identity-Based Authenticated Key Exchange Protocol

The past decade has witnessed a surge in exploration of cryptographic concepts based on pairings over Elliptic Curves. In particular, identity-based cryptographic protocols have received a lot of attention, motivated mainly by the desire to eliminate the need for large-scale public key infrastructure. We follow this trend in this work, by introducing a new Identity-Based Authenticated Key Excha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Jurnal Kejuruteraan

سال: 2021

ISSN: ['2289-7526', '0128-0198']

DOI: https://doi.org/10.17576/jkukm-2021-33(3)-31