Post-Quantum Cryptography Using Hyper-Complex Numbers

Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Kamlofsky, Jorge, Hecht, Pedro
Formato: Objeto de conferencia
Lenguaje:Español
Publicado: 2017
Materias:
Acceso en línea:http://sedici.unlp.edu.ar/handle/10915/63938
Aporte de:
id I19-R120-10915-63938
record_format dspace
institution Universidad Nacional de La Plata
institution_str I-19
repository_str R-120
collection SEDICI (UNLP)
language Español
topic Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
spellingShingle Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
Kamlofsky, Jorge
Hecht, Pedro
Post-Quantum Cryptography Using Hyper-Complex Numbers
topic_facet Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
description Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.
format Objeto de conferencia
Objeto de conferencia
author Kamlofsky, Jorge
Hecht, Pedro
author_facet Kamlofsky, Jorge
Hecht, Pedro
author_sort Kamlofsky, Jorge
title Post-Quantum Cryptography Using Hyper-Complex Numbers
title_short Post-Quantum Cryptography Using Hyper-Complex Numbers
title_full Post-Quantum Cryptography Using Hyper-Complex Numbers
title_fullStr Post-Quantum Cryptography Using Hyper-Complex Numbers
title_full_unstemmed Post-Quantum Cryptography Using Hyper-Complex Numbers
title_sort post-quantum cryptography using hyper-complex numbers
publishDate 2017
url http://sedici.unlp.edu.ar/handle/10915/63938
work_keys_str_mv AT kamlofskyjorge postquantumcryptographyusinghypercomplexnumbers
AT hechtpedro postquantumcryptographyusinghypercomplexnumbers
bdutipo_str Repositorios
_version_ 1764820479480168448