A KEY EXCHANGE PROTOCOL USING CONJUGACY PROBLEM IN THE DIVISION SEMIRINGS

Authors

  • Vijayaragavan R Department of Mathematics, Thiruvalluvar University, Vellore, Tamil Nadu, India.

Abstract

In this article, we present a new key exchange protocol which works in the division semiring. We prove that the protocol meets the security of key establishment based on the conjugacy search problem and security attribute also discussed.

References

Clay R. Nearrings: Genesis and Applications. New York: Oxford Science Publication; 1992.

Climent JJ, Navarro PR, Tortosa L. Key exchange protocols over noncommutative rings. The case of. Int J Comput Math 2012;89:1753 63.

Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory 1976;22:644 54.

Frohlich A. The near ring generated by the inner automorphisms of a finite simple group. J Lond Math Soc 1958;1:95 107.

Gu L, Zheng S. Conjugacy systems based on nonabelian factorization problems and their applications in cryptography. J Appl Math 2014;2014:630607.

Grigoriev D, Shpilrain V. Authentication from matrix conjugation. arXiv preprint arXiv: 1010.5034; 2012.

Kamal AA, Youssef AM. Cryptanalysis of a key exchange protocol based on the endomorphisms ring End(Zp*Zp2). Appl Algebra Eng Commun Comput 2012;23:143 9.

Koetal KH, Lee SJ, Cheon JH, Han JW, Kang JS, Park C. New public key cryptosystem using braid groups. In: Annual International Cryptology Conference. Berlin Heidelberg: Springer; 2000. p. 166 83.

Moldovyan DN, Moldovyan NA. A new hard problem over non commutative finite groups for cryptographic protocols. In: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. Berlin Heidelberg: Springer; 2010. p. 183 94.

Paeng SH, Ha KC, Kim JH, Chee S, Park C. New public key cryptosystem using finite non Abelian groups. In: Annual International Cryptology Conference. Berlin Heidelberg: Springer; 2012. p. 470 85.

Pilz G. Near rings North Holland. Amsterdam: American Elsevier; 1983.

Paeng SH. On the security of cryptosystem using automorphism groups. Inf Proces Lett 2003;88:293 8.

Lal S, Awasthi AK. Proxy blind signature scheme. J Inf Sci Eng Cryptol ePrint Archive Report 2003;72: .

Published

01-07-2018

How to Cite

R, V. (2018). A KEY EXCHANGE PROTOCOL USING CONJUGACY PROBLEM IN THE DIVISION SEMIRINGS. Innovare Journal of Engineering and Technology, 6(1), 29–30. Retrieved from https://journals.innovareacademics.in/index.php/ijet/article/view/21293

Issue

Section

Review Article(s)