Use of Commutativity for Cryptology in Secret Communication
نویسنده
چکیده
Commutativity of subsystems in cascade connected forms to form larger systems gets worthy to improve noise disturbance properties, stability, robustness and many other properties in system design. In this paper, another benefit of commutativity property is indicated, as far as the author knowledge for the first time, and illustrated by examples. This benefit is the gain of a new and original method for transmission of secret signals when travelling in a transmission channel. Hence, the paper presents an original and alternative method in cryptology. Their results are all validated by illustrative examples and Matlab simulation toolbox Simulink.
منابع مشابه
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups
We propose a new and simple framework for constructing fully homomorphic encryption (FHE) which is completely different from the previous work. We use finite non-commutative (a.k.a., non-abelian) groups which are “highly non-commutative” (e.g., the special linear groups of size two) as the underlying structure. We show that, on such groups, the AND and NOT operations on plaintext bits (which ar...
متن کاملA COMMUTATIVITY CONDITION FOR RINGS
In this paper, we use the structure theory to prove an analog to a well-known theorem of Herstein as follows: Let R be a ring with center C such that for all x,y ? R either [x,y]= 0 or x-x [x,y]? C for some non negative integer n= n(x,y) dependingon x and y. Then R is commutative.
متن کاملReducing Communication Channels in MPC
In both information-theoretic and computationally-secure MultiParty Computation (MPC) protocols the parties are usually assumed to be connected by a complete network of secure or authenticated channels, respectively. Taking inspiration from a recent, highly efficient, threeparty honest-majority computationally-secure MPC protocol of Araki et al., we show how to perform the most costly part of a...
متن کاملProxy Key Re-encapsulation Mechanism for Group Communications
Many practical applications use hybrid encryption mechanism to deal with large plaintext messages or real-time communication since the performance of the public key encryption scheme is poor. The key encapsulation is a crucial part in hybrid encryption mechanism, which allows a sender to generate a random session key and distribute it to recipient. In this paper we present a proxy key re-encaps...
متن کاملElsieFour: A Low-Tech Authenticated Encryption Algorithm For Human-to-Human Communication
ElsieFour (LC4) is a low-tech cipher that can be computed by hand; but unlike many historical ciphers, LC4 is designed to be hard to break. LC4 is intended for encrypted communication between humans only, and therefore it encrypts and decrypts plaintexts and ciphertexts consisting only of the English letters A through Z plus a few other characters. LC4 uses a nonce in addition to the secret key...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1711.02344 شماره
صفحات -
تاریخ انتشار 2017