{"title":"Three-Pass Cryptographic Protocol Based on Permutations","authors":"Shcherba Anatoly, Faure Emil, Lavdanska Olha","doi":"10.1109/ATIT50783.2020.9349343","DOIUrl":null,"url":null,"abstract":"The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATIT50783.2020.9349343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.