Semigroup action based on skew polynomial evaluation with applications to Cryptography
By: Daniel Camazón-Portela, Juan Antonio López-Ramos
Potential Business Impact:
Creates secret codes for safe online messages.
Through this work we introduce an action of the skew polynomial ring $\mathbb{F}_{q}\left[X; σ, δ\right]$ over $\mathbb{F}_{q}$ based on its polynomial valuation and the concept of left skew product of functions. This lead us to explore the construction of a certain subset $\mathcal{T}(X)\subset\mathbb{F}_{q}\left[X; σ, δ\right]$ that allow us to control the non-commutativity of this ring, and exploit this fact in order to build a public key exchange protocol that is secure in Canetti and Krawczyk model.
Similar Papers
Skew polynomial representations of matrix algebras and applications to coding theory
Information Theory
Creates better ways to store and send information.
On key exchange protocol based on Two-side multiplication action
Cryptography and Security
Breaks secret codes by solving math puzzles.
Cryptographic transformations over polyadic rings
Cryptography and Security
Makes secret codes much harder to break.