Use of Signed Permutations in Cryptography

Raharinirina, Iharantsoa Vero (2020) Use of Signed Permutations in Cryptography. Journal of Advances in Mathematics and Computer Science, 35 (1). pp. 23-38. ISSN 2456-9968

[thumbnail of Raharinirina3512019JAMCS50040.pdf] Text
Raharinirina3512019JAMCS50040.pdf - Published Version

Download (360kB)

Abstract

In this paper we consider cryptographic applications of the arithmetic on the hyperoctahedral group. On an appropriate subgroup of the latter, we particularly propose to construct public key cryptosystems based on the discrete logarithm. The fact that the group of signed permutations has rich properties provides fast and easy implementation and makes these systems resistant to attacks like the Pohlig-Hellman algorithm. The only negative point is that storing and transmitting permutations need large memory. Using together the hyperoctahedral enumeration system and what is called subexceedant functions, we define a one-to-one correspondence between natural numbers and signed permutations with which we label the message units.

Item Type: Article
Subjects: East India library > Mathematical Science
Depositing User: Unnamed user with email support@eastindialibrary.com
Date Deposited: 24 Feb 2023 12:16
Last Modified: 24 Aug 2024 13:23
URI: http://info.paperdigitallibrary.com/id/eprint/359

Actions (login required)

View Item
View Item