On a Cryptographic Identity in Osborn Loops

نویسندگان

  • Temitope Gbolahan Jaiyeola
  • John Olushola Adeniran
چکیده

This study digs out some new algebraic properties of an Osborn loop that will help in the future to unveil the mystery behind the middle inner mappings T(x) of an Osborn loop. These new algebraic properties, will open our eyes more to the study of Osborn loops like CC-loops which has received a tremendious attention in this 21st and VD-loops whose study is yet to be explored. In this study, some algebraic properties of non-WIP Osborn loops have been investigated in a broad manner. Huthnance was able to deduce some algebraic properties of Osborn loops with the WIP i.e universal weak WIPLs. So this work exempts the WIP. Two new loop identities, namely left self inverse property loop(LSIPL) identity and right self inverse property loop(RSLPL) are introduced for the first time and it is shown that in an Osborn loop, they are equivalent. A CC-loop is shown to be power associative if and only if it is a RSLPL or LSIPL. Among the few identities that have been established for Osborn loops, one of them is recognized and recommended for cryptography in a similar spirit in which the cross inverse property has been used by Keedwell following the fact that it was observed that Osborn loops that do not have the LSIP or RSIP or 3-PAPL or weaker forms of inverse property, power associativity and diassociativity to mention a few, will have cycles(even long ones). These identity is called an Osborn cryptographic identity(or just a cryptographic identity).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

J un 2 00 8 A Pair Of Smarandachely Isotopic Quasigroups And Loops Of The Same Variety ∗ †

The isotopic invariance or universality of types and varieties of quasigroups and loops described by one or more equivalent identities has been of interest to researchers in loop theory in the recent past. A variety of quasigroups(loops) that are not universal have been found to be isotopic invariant relative to a special type of isotopism or the other. Presently, there are two outstanding open...

متن کامل

Ja n 20 08 A Pair Of Smarandachely Isotopic Quasigroups And Loops Of The Same Variety ∗

The isotopic invariance or universality of types and varieties of quasigroups and loops described by one or more equivalent identities has been of interest to researchers in loop theory in the recent past. A variety of quasigroups(loops) that are not universal have been found to be isotopic invariant relative to a special type of isotopism or the other. Presently, there are two outstanding open...

متن کامل

Design of cybernetic metamodel of cryptographic algorithms and ranking of its supporting components using ELECTRE III method

Nowadays, achieving desirable and stable security in networks with national and organizational scope and even in sensitive information systems, should be based on a systematic and comprehensive method and should be done step by step. Cryptography is the most important mechanism for securing information. a cryptographic system consists of three main components: cryptographic algorithms, cryptogr...

متن کامل

Winning the Housing Lottery : Changing University Housing Policies for Transgender Students

At Southern Utah University, Kourt Osborn, a transgender student, was denied a dorm room because of his gender identity. Born as a female, Osborn, who identifies as a male, applied to live in the male dorms. The University determined that Osborn could live in the men’s dormitory only with physician supervision of his hormone treatment, therapist acknowledgment of his Gender Identity Disorder, a...

متن کامل

A novel key management scheme for heterogeneous sensor networks based on the position of nodes

Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2008  شماره 

صفحات  -

تاریخ انتشار 2008