To obtain access to full text of journal and articles you must register!
- Article name
- Post-quantum No-key Encryption Protocol
- Authors
- Moldovyan N. A., , nmold@mail.ru, St. Petersburg Federal Research Center of the RAS (SPC RAS), St. Petersburg, Russia
Abrosimov I. K., , ivnabr@yandex.ru, St. Petersburg Federal Research Center of the Russian Academy of Sciences (SPC RAS), Institute for Informatics and Automation of the Russian Academy of Sciences, St.-Petersburg, Russia
Kovaleva I. V., , jemchaud@gmail.com, St. Petersburg State Electrotechnical University "LETI", St.-Petersburg, Russia
- Keywords
- information protection / cryptography / no-key encryption / no-key protocol / local keys / single-use keys / finite groups / non-commutative groups / computationally difficult problem
- Year
- 2017 Issue 3 Pages 3 - 13
- Code EDN
- Code DOI
- Abstract
- There are considered cryptoschemes based on computations in non-commutative finite groups as well as methods for defining finite non-commutative groups and rings of four-dimension vectors over the round finite field. It is proposed a new type of the basis-vectors multiplication table providing the associative operation of multiplying vectors. Properties of the constructed finite ring have been investigated. It is shown potential possibility of applying the operation of homophonic mapping the multiplicative group of the ring in the set of non-invertible vectors for designing protocols of the public key agreement and of the public encryption. It is derived formula for computing the order of the multiplicative group. Two variants of the post-quantum no-key encryption protocol are constructed. A feature of the proposed cryptoschemes is applying the single-use local keys.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy