Explore
Interactions between Group Theory, Symmetry and Cryptology
0 Ungluers have
Faved this Work
Login to Fave
Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.
This book is included in DOAB.
Why read this book? Have your say.
You must be logged in to comment.
Rights Information
Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.Downloads
This work has been downloaded 155 times via unglue.it ebook links.
- 123 - pdf (CC BY-NC-ND) at Unglue.it.
Keywords
- algebraic-geometry code
- algorithms in groups
- alternating group
- Berlekamp–Massey algorithm
- beyond birthday bound
- block cipher
- braid groups
- cryptanalysis
- Cryptography
- Digital signatures
- Engel words
- error-correcting code
- euclidean algorithm
- generalized self-shrinking generator
- group key establishment
- Group theory
- group-based cryptography
- ideal cipher model
- key agreement protocol
- key equation
- lightweight cryptography
- non-commutative cryptography
- NP-Completeness
- numerical semigroup
- one-way functions
- Permutation Group
- post-quantum cryptography
- protocol compiler
- provable security
- pseudo-random number generator
- pseudorandom permutation
- Reed–Solomon codes
- semigroup ideal
- statistical randomness tests
- Sugiyama et al. algorithm
- Symmetry
- t-modified self-shrinking generator
- WalnutDSA
- Weierstrass semigroup