Post-Quantum Cryptography Using Hyper-Complex Numbers
- Autores
- Kamlofsky, Jorge; Hecht, Pedro
- Año de publicación
- 2017
- Idioma
- español castellano
- Tipo de recurso
- documento de conferencia
- Estado
- versión publicada
- Descripción
- Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI) - Materia
-
Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography - Nivel de accesibilidad
- acceso abierto
- Condiciones de uso
- http://creativecommons.org/licenses/by-nc-sa/4.0/
- Repositorio
- Institución
- Universidad Nacional de La Plata
- OAI Identificador
- oai:sedici.unlp.edu.ar:10915/63938
Ver los metadatos del registro completo
id |
SEDICI_80c2f06437e8a9bd7cdebf830dde16fe |
---|---|
oai_identifier_str |
oai:sedici.unlp.edu.ar:10915/63938 |
network_acronym_str |
SEDICI |
repository_id_str |
1329 |
network_name_str |
SEDICI (UNLP) |
spelling |
Post-Quantum Cryptography Using Hyper-Complex NumbersKamlofsky, JorgeHecht, PedroCiencias Informáticasoctonion's cipherquaternion's ciphernon-commutative cryptographyEncrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.VI Workshop de Seguridad Informática (WSI).Red de Universidades con Carreras en Informática (RedUNCI)2017-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf1299-1309http://sedici.unlp.edu.ar/handle/10915/63938spainfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-03T10:41:05Zoai:sedici.unlp.edu.ar:10915/63938Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-03 10:41:06.122SEDICI (UNLP) - Universidad Nacional de La Platafalse |
dc.title.none.fl_str_mv |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
spellingShingle |
Post-Quantum Cryptography Using Hyper-Complex Numbers Kamlofsky, Jorge Ciencias Informáticas octonion's cipher quaternion's cipher non-commutative cryptography |
title_short |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_full |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_fullStr |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_full_unstemmed |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
title_sort |
Post-Quantum Cryptography Using Hyper-Complex Numbers |
dc.creator.none.fl_str_mv |
Kamlofsky, Jorge Hecht, Pedro |
author |
Kamlofsky, Jorge |
author_facet |
Kamlofsky, Jorge Hecht, Pedro |
author_role |
author |
author2 |
Hecht, Pedro |
author2_role |
author |
dc.subject.none.fl_str_mv |
Ciencias Informáticas octonion's cipher quaternion's cipher non-commutative cryptography |
topic |
Ciencias Informáticas octonion's cipher quaternion's cipher non-commutative cryptography |
dc.description.none.fl_txt_mv |
Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography. VI Workshop de Seguridad Informática (WSI). Red de Universidades con Carreras en Informática (RedUNCI) |
description |
Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography. |
publishDate |
2017 |
dc.date.none.fl_str_mv |
2017-10 |
dc.type.none.fl_str_mv |
info:eu-repo/semantics/conferenceObject info:eu-repo/semantics/publishedVersion Objeto de conferencia http://purl.org/coar/resource_type/c_5794 info:ar-repo/semantics/documentoDeConferencia |
format |
conferenceObject |
status_str |
publishedVersion |
dc.identifier.none.fl_str_mv |
http://sedici.unlp.edu.ar/handle/10915/63938 |
url |
http://sedici.unlp.edu.ar/handle/10915/63938 |
dc.language.none.fl_str_mv |
spa |
language |
spa |
dc.relation.none.fl_str_mv |
info:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9 |
dc.rights.none.fl_str_mv |
info:eu-repo/semantics/openAccess http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
eu_rights_str_mv |
openAccess |
rights_invalid_str_mv |
http://creativecommons.org/licenses/by-nc-sa/4.0/ Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
dc.format.none.fl_str_mv |
application/pdf 1299-1309 |
dc.source.none.fl_str_mv |
reponame:SEDICI (UNLP) instname:Universidad Nacional de La Plata instacron:UNLP |
reponame_str |
SEDICI (UNLP) |
collection |
SEDICI (UNLP) |
instname_str |
Universidad Nacional de La Plata |
instacron_str |
UNLP |
institution |
UNLP |
repository.name.fl_str_mv |
SEDICI (UNLP) - Universidad Nacional de La Plata |
repository.mail.fl_str_mv |
alira@sedici.unlp.edu.ar |
_version_ |
1842260277360328704 |
score |
13.13397 |