2017博士论坛:基于等差数列的新密码系统

C. Srikanth
{"title":"2017博士论坛:基于等差数列的新密码系统","authors":"C. Srikanth","doi":"10.1109/ADCOM.2017.00016","DOIUrl":null,"url":null,"abstract":"In this paper, we present salient properties of the mathematical object: sequence (collection) of arithmetic progressions, with the inverse property: i^th terms of j^th and (j + 1)^th progressions are multiplicative inverses of each other modulo (i + 1)^th term of j^th progression. The theory developed (in my doctoral thesis) on the defined object paves the way for a novel design of cryptographic primitives for (i) symmetric key cryptography, (ii) entity authentication, (iii) end-end encryption, and (iv) crypto-currencies. In addition to being efficient, the proposed primitives are customizable as they support a wide range of values for their security parameters. The customization feature allows proprietary versions, which can be used in both civilian and military applications. The proposed primitives are amenable to parallelization and well-suited for hardware portability. The security of these primitives is based on an well-defined hard problem. Some special cases of the problem are shown to be equivalent to the problem of factoring large integers, a holy grail of mathematics, whose computational difficulty is central to the security of RSA cryptosystem.","PeriodicalId":170361,"journal":{"name":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"PhD Forum 2017 New Cryptographic Systems Based on Certain Sequences of Arithmetic Progressions\",\"authors\":\"C. Srikanth\",\"doi\":\"10.1109/ADCOM.2017.00016\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present salient properties of the mathematical object: sequence (collection) of arithmetic progressions, with the inverse property: i^th terms of j^th and (j + 1)^th progressions are multiplicative inverses of each other modulo (i + 1)^th term of j^th progression. The theory developed (in my doctoral thesis) on the defined object paves the way for a novel design of cryptographic primitives for (i) symmetric key cryptography, (ii) entity authentication, (iii) end-end encryption, and (iv) crypto-currencies. In addition to being efficient, the proposed primitives are customizable as they support a wide range of values for their security parameters. The customization feature allows proprietary versions, which can be used in both civilian and military applications. The proposed primitives are amenable to parallelization and well-suited for hardware portability. The security of these primitives is based on an well-defined hard problem. Some special cases of the problem are shown to be equivalent to the problem of factoring large integers, a holy grail of mathematics, whose computational difficulty is central to the security of RSA cryptosystem.\",\"PeriodicalId\":170361,\"journal\":{\"name\":\"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)\",\"volume\":\"42 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ADCOM.2017.00016\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 23RD Annual International Conference in Advanced Computing and Communications (ADCOM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ADCOM.2017.00016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本文给出了等差数列的序列(集合)的显著性质,并给出了等差数列的i^项与(j + 1)^项的逆性质:j^项与(j + 1)^项的模互为乘积逆。(在我的博士论文中)在定义对象上开发的理论为(i)对称密钥密码学,(ii)实体认证,(iii)端到端加密和(iv)加密货币的加密原语的新设计铺平了道路。除了高效之外,所建议的原语是可定制的,因为它们支持广泛的安全参数值。定制功能允许专有版本,可用于民用和军事应用。提议的原语支持并行化,并且非常适合硬件可移植性。这些原语的安全性基于一个定义良好的难题。该问题的一些特殊情况被证明等同于分解大整数的问题,这是数学的圣杯,其计算难度是RSA密码系统安全性的核心。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
PhD Forum 2017 New Cryptographic Systems Based on Certain Sequences of Arithmetic Progressions
In this paper, we present salient properties of the mathematical object: sequence (collection) of arithmetic progressions, with the inverse property: i^th terms of j^th and (j + 1)^th progressions are multiplicative inverses of each other modulo (i + 1)^th term of j^th progression. The theory developed (in my doctoral thesis) on the defined object paves the way for a novel design of cryptographic primitives for (i) symmetric key cryptography, (ii) entity authentication, (iii) end-end encryption, and (iv) crypto-currencies. In addition to being efficient, the proposed primitives are customizable as they support a wide range of values for their security parameters. The customization feature allows proprietary versions, which can be used in both civilian and military applications. The proposed primitives are amenable to parallelization and well-suited for hardware portability. The security of these primitives is based on an well-defined hard problem. Some special cases of the problem are shown to be equivalent to the problem of factoring large integers, a holy grail of mathematics, whose computational difficulty is central to the security of RSA cryptosystem.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Smart Contracts in Mobile Telecom Networks Priority Heuristic in Mobile Distributed Real Time Database Using Optimistic Concurrency Control VSK Chains: Integrated Content and Currency Transaction Blockchains PhD Forum 2017 New Cryptographic Systems Based on Certain Sequences of Arithmetic Progressions Passport, VISA and Immigration Management Using Blockchain
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1