Cybernetics And Systems Analysis logo
Editorial Board Announcements Abstracts Authors Archive
Cybernetics And Systems Analysis
International Theoretical Science Journal
-->

UDC 51.681.3
S.L. Kryvyi, V.N. Opanasenko2, E.A. Grinenko3, Yu.A. Nortman4


1 Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

sl.krivoi@gmail.com

2 V.M. Glushkov Institute of Cybernetics, National Academy of Sciences of Ukraine, Kyiv, Ukraine

opanasenkoincyb@gmail.com

3 National Aviation University, Kyiv, Ukraine

olena.hrinenko@npp.nau.edu

4 Taras Shevchenko National University of Kyiv, Kyiv, Ukraine

ynortman@gmail.com

SYMMETRIC INFORMATION EXCHANGE SYSTEM BASED ON RING ISOMORPHISM

Abstract. The algorithms for exchange of information between subscribers on the basis of finite associative-commutative rings with unity and linear Diophantine equations over such rings are proposed. Algorithms for construction of finite rings whose additive groups are full-cycle, and algorithms for construction of the izomorphism between a ring of k -th order whose additive group is full-cycle and the residue ring Zk modulo k  are presented.

Keywords: cryptographical protocol, izomorphism, ring, algorithm.


FULL TEXT

REFERENCES

  1. Kryvyi S.L. A cryptosystem based on Abelian groups and rings. Problemy prohramuvannya. 2020. N 2–3. P. 270–277.

  2. Kryvyi S.L. Application of commutative rings with a unit to build a symmetric encryption system. Kibernetyka ta systemnyi analiz. 2022. Vol. 58, N 3. P. 3–16.

  3. Kostrikin A.I. Introduction to algebra. Moscow: Nauka, 1977. 495 p.

  4. Bukhshtab A.A. Number theory[in Russian]. Moscow: Prosveshcheniye, 1966. 384 p.

  5. Lipsky V. Combinatorics for programmers [in Russian]. Moscow: Mir, 1988. 201 p.

  6. Koblitz N. A course in number theory and cryptography [Russian translation]. Moscow: TVP, 2001. 260 p.

  7. Kryvyi S.L. Algorithms for solution of systems of linear Diophantine equations in residues fieds. Cybernetics and Systems Analysis. 2007. N 2. P. 171–178.

  8. Kryvyi S.L. Algorithms for solving systems of linear Diophantine equations in residues rings. Cybernetics and Systems Analysis. 2007. N 6. С. 787–798.

  9. Opanasenko V.N., Kryvyi S.L. Synthesis of neural-like networks on the basis of conversion of cyclic Hamming codes. Cybernetics and Systems Analysis. 2017. Vol. 53, N. 4. P. 627–635.

  10. Wenbo Mao. Modern cryptography [Russian translation]. St. Petersburg: Williams, 2005. 763 p.

  11. Kameswari P.A., Sriniasarao S.S., Belay A. An application of linear Diophantine equations to cryptography. Advanced in Mathematics: Scientific Journal. 2021. Vol. 10. P. 2799–2806.

  12. Berczes A., Lajos H., Hirete-Kohno N., Kovacs T. A key exchange propocol based on Diophantine equations and S-integers. JSIAM Letters, 2014. P. 85–88.




© 2022 Kibernetika.org. All rights reserved.