An Application of Co-medial Algebras with Quasigroup Operations on Cryptology
-
2453
Downloads
-
3438
Views
Authors
Amir Ehsani
- Department of Mathematics, College of Polymer, Mahshahr Branch, Islamic Azad University, Mahshahr, Iran.
Abstract
A modification of Markovski quasigroup based crypto-algorytm has been presented. This modification is based on the pair of co-medial quasigroup operations, which we show that they are orthogonal quasigroup operations.
Share and Cite
ISRP Style
Amir Ehsani, An Application of Co-medial Algebras with Quasigroup Operations on Cryptology, Journal of Mathematics and Computer Science, 10 (2014), no. 2, 113-118
AMA Style
Ehsani Amir, An Application of Co-medial Algebras with Quasigroup Operations on Cryptology. J Math Comput SCI-JM. (2014); 10(2):113-118
Chicago/Turabian Style
Ehsani, Amir. "An Application of Co-medial Algebras with Quasigroup Operations on Cryptology." Journal of Mathematics and Computer Science, 10, no. 2 (2014): 113-118
Keywords
- co-medial pair of operations
- quasigroup operation
- orthogonal operations
- cryptology
- cipher-text
- enciphering.
MSC
References
-
[1]
V. D. Belousov, The group associated with a quasigroup, Mat. Issled., 4(3) (1969), 21 – 39.
-
[2]
A. Ehsani, The Generalized entropic property for the pair of operations, Journal of ContemporaryMathematical Analysis , 46(1) (2011), 29-34.
-
[3]
A. Ehsani , On Regular Co-medial Algebras, J. Mathematics Research , 4(2) (2012), 101-109.
-
[4]
A. Ehsani, On Medial-like Functional Equations, Mathematical Problems of ComputerScience , 38 (2012), 53-55.
-
[5]
A. Ehsani, Yu. M. Movsisyan, Linear Representation of Medial-like Algebras, Communications in Algebra , 41(9) (2013), 3429-3444.
-
[6]
V. Domashev, V. Popov, D. Pravikov, I. Prokof’ev, A. Shcherbakov, Programming of algorithms of defense of information, Nolidge, Moscow (2000)
-
[7]
H. Feistel, Cryptography and computer privacy, Scientific American , 228(5) (1973), 15–23.
-
[8]
S. H. Kamali, M. Hedayati, R. Shakerian, S. Ghasempour, Using Identity-Based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing, The Journal of Mathematics and Computer Science , 3(4) (2011), 357-375.
-
[9]
S. Markovski, D. Gligoroski, S. Andova, Using quasigroups for one-one secure encoding, In Proc. VIII Conf. Logic and Computer Science ”LIRA97”, Novi Sad, (1997), 157–167.
-
[10]
S. Markovski, D. Gligoroski, V. Bakeva, Quasigroup string processing , Part 1, Contributions, Sec. Math. Tech. Sci., MANU, XX, (1-2) (1999), 13–28.
-
[11]
S. Markovski, V. Kusakatov, Quasigroup string processing, Part 2, Contributions, Sec. Math.Tech. Sci., MANU, XXI, (1-2) (2000), 15–32.
-
[12]
A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL (1997)
-
[13]
N. A. Moldovyan, Problems and methods of cryptology, S.Petersburg University Press, S.Petersburg (1998)
-
[14]
G. L. Mullen, V. A. Shcherbacov, Onorthogonality of binary operations and squares, BULETINUL ACADEMIEI DE STIINTE A REPUBLICII MOLDOVA. MATEMATICA , 2(48) (2005), 3–42.
-
[15]
H. O. Pflugfelder, Quasigroups and Loops, Introduction,HeldermannVerlag, Berlin (1990)
-
[16]
A. Romanowska, J. D. H. Smith, Modes, World Scientific, River Edge, New Jersey (2002)