On New Examples of Families of Multivariate Stable Maps and their Cryptographical Applications
نویسندگان
چکیده
Let K be a general nite commutative ring. We refer to a family gn, n = 1, 2, . . . of bijective polynomial multivariate maps of K as a family with invertible decomposition gn = g ng 2 n . . . g k n, such that the knowledge of the composition of g n allows computation of g i n for O(n ) (s > 0) elementary steps. A polynomial map g is stable if all non-identical elements of kind g, t > 0 are of the same degree. We construct a new family of stable elements with invertible decomposition. This is the rst construction of the family of maps based on walks on the bipartite algebraic graphs de ned over K, which are not edge transitive. We describe the application of the above mentioned construction for the development of stream ciphers, public key algorithms and key exchange protocols. The absence of edge transitive group essentially complicates cryptanalysis.
منابع مشابه
Discrete Versus Continuous Maps – A Cryptographical Comparison
Abstract— Discrete-value and continuous-value maps are compared with respect to their cryptographical properties. In order to provide a more rigid evaluation of nonlinear chaotic encryption systems information-theoretic measures are derived that allow a comparison with classical discrete-value systems. Furthermore the consideration gives some insight about the general limitations of continuousv...
متن کاملOn new multivariate cryptosystems based on hidden Eulerian equations over finite fields
We propose new multivariate cryptosystems over n-dimensional vector space over a finite field Fq based on idea of hidden discrete logarithm problem for F ∗ q. These cryptosystems are based on hidden eulerian equations x = a, (α, q − 1) = 1. The method is based on the idea of Eulerian transformations, which allow us to use asymmetric algorithms based on families of nonlinear multiplicatively inj...
متن کاملOn Graph-based Cryptography and Symbolic Computations
We have been investigating the cryptographical properties of infinite families of simple graphs of large girth with the special colouring of vertices during the last 10 years. Such families can be used for the development of cryptographical algorithms (on symmetric or public key modes) and turbocodes in error correction theory. Only few families of simple graphs of large unbounded girth and arb...
متن کاملComparsion Between Several Distributions of Exponential Family and Offering Their Features and Applications
In this paper, first, we investigate probability density function and the failure rate function of some families of exponential distributions. Then we present their features such as expectation, variance, moments and maximum likelihood estimation and we identify the most flexible distributions according to the figure of probability density function and the failure rate function and f...
متن کاملOn Multivariate Cryptosystems Based on Computable Maps with Invertible Decomposition
Let K be a commutative ring and K be an affine space over K of dimension n. We introduce the concept of a family of multivariate maps f(n) of K into itself with invertible decomposition. If f(n) is computable in polynomial time then it can be used as the public rule and the invertible decomposition provides a private key in f(n) based public key infrastructure. Requirements of polynomial ity of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Annales UMCS, Informatica
دوره 14 شماره
صفحات -
تاریخ انتشار 2014