Use of Commutativity for Cryptology in Secret Communication

نویسنده

  • Mehmet Emir Koksal
چکیده

Commutativity of subsystems in cascade connected forms to form larger systems gets worthy to improve noise disturbance properties, stability, robustness and many other properties in system design. In this paper, another benefit of commutativity property is indicated, as far as the author knowledge for the first time, and illustrated by examples. This benefit is the gain of a new and original method for transmission of secret signals when travelling in a transmission channel. Hence, the paper presents an original and alternative method in cryptology. Their results are all validated by illustrative examples and Matlab simulation toolbox Simulink.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups

We propose a new and simple framework for constructing fully homomorphic encryption (FHE) which is completely different from the previous work. We use finite non-commutative (a.k.a., non-abelian) groups which are “highly non-commutative” (e.g., the special linear groups of size two) as the underlying structure. We show that, on such groups, the AND and NOT operations on plaintext bits (which ar...

متن کامل

A COMMUTATIVITY CONDITION FOR RINGS

In this paper, we use the structure theory to prove an analog to a well-known theorem of Herstein as follows: Let R be a ring with center C such that for all x,y ? R either [x,y]= 0 or x-x [x,y]? C for some non negative integer n= n(x,y) dependingon x and y. Then R is commutative.

متن کامل

Reducing Communication Channels in MPC

In both information-theoretic and computationally-secure MultiParty Computation (MPC) protocols the parties are usually assumed to be connected by a complete network of secure or authenticated channels, respectively. Taking inspiration from a recent, highly efficient, threeparty honest-majority computationally-secure MPC protocol of Araki et al., we show how to perform the most costly part of a...

متن کامل

Proxy Key Re-encapsulation Mechanism for Group Communications

Many practical applications use hybrid encryption mechanism to deal with large plaintext messages or real-time communication since the performance of the public key encryption scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows a sender to generate a random session key and distribute it to recipient. In this paper we present a proxy key re-encaps...

متن کامل

ElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication

ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed to be hard to break. LC4 is intended for encrypted communication between humans only, and therefore it encrypts and decrypts plaintexts and ciphertexts consisting only of the English letters A through Z plus a few other characters. LC4 uses a nonce in addition to the secret key...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1711.02344  شماره 

صفحات  -

تاریخ انتشار 2017