Quaternion Public Key Cryptosystems

被引:0
|
作者
Valluri, Maheswara Rao [1 ]
Narayan, Shailendra Vikash [1 ]
机构
[1] Fiji Natl Univ, Sch Math & Comp Sci, POB 7222,Derrick Campus, Suva, Fiji
关键词
Brute force attack; key exchange; public key cryptosystem; quaternion hidden conjugacy search problem; quaternion ring; DISCRETE LOGARITHMS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, quaternion key exchange protocol and quaternion public key encryption scheme are proposed. The security of proposals relies on hardness of the hidden quaternion conjugacy search problem, that is, difficulty of solving the simultaneous quaternion discrete logarithmic problem and quaternion conjugacy search problem over quaternion rings modulo prime, p. Also, the performance and the security related issues of the proposals have been discussed.
引用
收藏
页码:48 / 51
页数:4
相关论文
共 50 条
  • [21] Efficient and secure public-key cryptosystems
    Takagi, T
    CONTEMPORARY CRYPTOLOGY, 2005, : 191 - 237
  • [22] Efficiency of public key cryptosystems as block ciphers
    Hassoun, Youssef
    Owayjan, Michel
    Counsell, Steve
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 138 - 143
  • [23] Cryptanalysis of Rational Multivariate Public Key Cryptosystems
    Ding, Jintai
    Wagner, John
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2008, 5299 : 124 - 136
  • [24] A study of public key cryptosystems based on quasigroups
    Kumar, Satish
    Gupta, Indivar
    Gupta, Ashok Ji
    CRYPTOLOGIA, 2023, 47 (06) : 511 - 540
  • [25] Group ring based public key cryptosystems
    Mittal, Gaurav
    Kumar, Sunil
    Narain, Shiv
    Kumar, Sandeep
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (06): : 1683 - 1704
  • [26] Security and design of knapsack public key cryptosystems
    He, Jingmin
    Lu, Kaicheng
    Ching Hua Ta Hsueh Hsueh Pao/ Journal of Ching Hua University, 1988, 28 (01): : 89 - 97
  • [27] Analysis of two knapsack public key cryptosystems
    Peng, Liqiang
    Hu, Lei
    Xu, Jun
    Xie, Yonghong
    Zuo, Jinyin
    IET COMMUNICATIONS, 2013, 7 (15) : 1638 - 1643
  • [28] FPGA based unified architecture for public key and private key cryptosystems
    Wang, Yi
    Li, Renfa
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (03) : 307 - 316
  • [29] Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
    Thomas Scanlon
    Journal of Cryptology, 2001, 14 : 225 - 230
  • [30] FPGA based unified architecture for public key and private key cryptosystems
    Yi Wang
    Renfa Li
    Frontiers of Computer Science, 2013, 7 : 307 - 316