Post-Quantum Cryptography Using Hyper-Complex Numbers

Autores
Kamlofsky, Jorge; Hecht, Pedro
Año de publicación
2017
Idioma
español castellano
Tipo de recurso
documento de conferencia
Estado
versión publicada
Descripción
Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI)
Materia
Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
Nivel de accesibilidad
acceso abierto
Condiciones de uso
http://creativecommons.org/licenses/by-nc-sa/4.0/
Repositorio
SEDICI (UNLP)
Institución
Universidad Nacional de La Plata
OAI Identificador
oai:sedici.unlp.edu.ar:10915/63938

id SEDICI_80c2f06437e8a9bd7cdebf830dde16fe
oai_identifier_str oai:sedici.unlp.edu.ar:10915/63938
network_acronym_str SEDICI
repository_id_str 1329
network_name_str SEDICI (UNLP)
spelling Post-Quantum Cryptography Using Hyper-Complex NumbersKamlofsky, JorgeHecht, PedroCiencias Informáticasoctonion's cipherquaternion's ciphernon-commutative cryptographyEncrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.VI Workshop de Seguridad Informática (WSI).Red de Universidades con Carreras en Informática (RedUNCI)2017-10info:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionObjeto de conferenciahttp://purl.org/coar/resource_type/c_5794info:ar-repo/semantics/documentoDeConferenciaapplication/pdf1299-1309http://sedici.unlp.edu.ar/handle/10915/63938spainfo:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9info:eu-repo/semantics/openAccesshttp://creativecommons.org/licenses/by-nc-sa/4.0/Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)reponame:SEDICI (UNLP)instname:Universidad Nacional de La Platainstacron:UNLP2025-09-03T10:41:05Zoai:sedici.unlp.edu.ar:10915/63938Institucionalhttp://sedici.unlp.edu.ar/Universidad públicaNo correspondehttp://sedici.unlp.edu.ar/oai/snrdalira@sedici.unlp.edu.arArgentinaNo correspondeNo correspondeNo correspondeopendoar:13292025-09-03 10:41:06.122SEDICI (UNLP) - Universidad Nacional de La Platafalse
dc.title.none.fl_str_mv Post-Quantum Cryptography Using Hyper-Complex Numbers
title Post-Quantum Cryptography Using Hyper-Complex Numbers
spellingShingle Post-Quantum Cryptography Using Hyper-Complex Numbers
Kamlofsky, Jorge
Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
title_short Post-Quantum Cryptography Using Hyper-Complex Numbers
title_full Post-Quantum Cryptography Using Hyper-Complex Numbers
title_fullStr Post-Quantum Cryptography Using Hyper-Complex Numbers
title_full_unstemmed Post-Quantum Cryptography Using Hyper-Complex Numbers
title_sort Post-Quantum Cryptography Using Hyper-Complex Numbers
dc.creator.none.fl_str_mv Kamlofsky, Jorge
Hecht, Pedro
author Kamlofsky, Jorge
author_facet Kamlofsky, Jorge
Hecht, Pedro
author_role author
author2 Hecht, Pedro
author2_role author
dc.subject.none.fl_str_mv Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
topic Ciencias Informáticas
octonion's cipher
quaternion's cipher
non-commutative cryptography
dc.description.none.fl_txt_mv Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.
VI Workshop de Seguridad Informática (WSI).
Red de Universidades con Carreras en Informática (RedUNCI)
description Encrypted communications are performed using symmetric ciphers, which require asymmetric cryptography for safe initiation. Asymmetric cryptography was seriously weakened after the presentation of Shor’s algorithm (1997) and others for quantum computers. New algorithms are generalized as post quantum cryptography. Asymmetric cryptography based on noncommutative algebra is a growing trend arising as a solid choice that strengthens these protocols. Hyper-complex numbers generated by the Cayley-Dickson construction forms non-commutative algebras. This paper focus on the use of these numbers in post-quantum cryptography.
publishDate 2017
dc.date.none.fl_str_mv 2017-10
dc.type.none.fl_str_mv info:eu-repo/semantics/conferenceObject
info:eu-repo/semantics/publishedVersion
Objeto de conferencia
http://purl.org/coar/resource_type/c_5794
info:ar-repo/semantics/documentoDeConferencia
format conferenceObject
status_str publishedVersion
dc.identifier.none.fl_str_mv http://sedici.unlp.edu.ar/handle/10915/63938
url http://sedici.unlp.edu.ar/handle/10915/63938
dc.language.none.fl_str_mv spa
language spa
dc.relation.none.fl_str_mv info:eu-repo/semantics/altIdentifier/isbn/978-950-34-1539-9
dc.rights.none.fl_str_mv info:eu-repo/semantics/openAccess
http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
eu_rights_str_mv openAccess
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-sa/4.0/
Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0)
dc.format.none.fl_str_mv application/pdf
1299-1309
dc.source.none.fl_str_mv reponame:SEDICI (UNLP)
instname:Universidad Nacional de La Plata
instacron:UNLP
reponame_str SEDICI (UNLP)
collection SEDICI (UNLP)
instname_str Universidad Nacional de La Plata
instacron_str UNLP
institution UNLP
repository.name.fl_str_mv SEDICI (UNLP) - Universidad Nacional de La Plata
repository.mail.fl_str_mv alira@sedici.unlp.edu.ar
_version_ 1842260277360328704
score 13.13397