Cybernetics And Systems Analysis logo
Editorial Board Announcements Abstracts Authors Archive
KIBERNETYKA TA SYSTEMNYI ANALIZ
International Theoretical Science Journal
-->

DOI 10.34229/KCA2522-9664.25.5.2
UDC 51.681.3

S. Kryvyi
Taras Shevchenko National University of Kyiv, Kyiv, Ukraine,
sl.krivoi@gmail.com


INFORMATION EXCHANGE SYSTEM BASED ON MAPS OF RINGS

Abstract. A cryptosystem for information exchange between subscribers based on surjective mappings of finite associative commutative rings with unity and systems of linear congruences over such rings is proposed. Algorithms for constructing surjective mappings of rings are presented, as well as a protocol for information exchange and the computational features of the means for implementing the protocol. The system does not require cumbersome calculations and construction of ring operation tables, and its stability is based on the combinatorial complexity of the set of surjective mappings and isomorphisms between finite rings of relatively small orders. The algorithms for solving systems of linear congruences that appear in the information exchange protocol are used to encrypt messages and have polynomial complexity. The operation of the cryptosystem is demonstrated with examples.

Keywords: cryptography, symmetric cryptosystem, finite rings, isomorphism, system of linear congruences.


full text

REFERENCES

    • 1. Mao W. Modern cryptography: Theory and practice. Upper Saddle River, NJ: Prentice Hall Professional Technical Reference, 2004. 707 p.
    • 2. Kameswari P.A., Sriniasarao S.S., Belay A. An application of linear Diophantine equations to cryptography. Advanced in Mathematics: Scientific Journal. 2021. Vol. 10, N 6. P. 2799–2806. URL: https://www.research-publication.com/amsj/uploads/papers/vol-10/iss-06/AMSJ-2021-N06-08.pdf.
    • 3. Hermann M., Juban L., Kolaitis P.G. On the complexity of counting the Hilbert basis of a linear Diophantine system. In: Logic for programming and automated reasoning. LPAR 1999. Ganzinger H., McAllester D., Voronkov A. (Eds). Lecture Notes in Computer Science. Berlin; Heidelberg: Springer, 1999. Vol. 1705. P. 13–32. https://doi.org/10.1007/3-540-48242-3_2.
    • 4. Bérczes A., Hajdu L., Hirata-Kohno N., Kovїcs T., PethA. A key exchange protocol based on Diophantine equations and S-integers. JSIAM Letters. 2014. Vol. 6. P. 85–88. https://doi.org/10.14495/jsiaml.6.85.
    • 5. Kryvyi S., Opanasenko V., Grinenko O., Nortman Yu. Symmetric system for exchange information on the base of surjective isomorphism of rings. Proc. 12th International IEEE Conference on Dependable Systems, Services and Technologies (DESSERT 2022) (9–11 December 2022, Athens, Greece). Athens, 2022. P. 1–7. https://doi.org/10.1109/DESSERT58054.2022.10018663.
    • 6. Shoup V. A computational introduction to number theory and algebra. Cambridge University Press, 2008. 580 p. https://doi.org/10.1017/CBO9780511814549.
    • 7. Kryvyi S.L. Linear Diophantine constraints and their applications [in Ukrainian]. Kyiv: Interservice, 2021. 257 p.



© 2025 Kibernetika.org. All rights reserved.