eISSN:2278-5299

International Journal of Latest Research in Science and Technology

DOI:10.29111/ijlrst   ISRA Impact Factor:3.35,  Peer-reviewed, Open-access Journal

A News Letter Sign UP!
THE PLACE OF GROUP THEORY ON RECENT TRENDS IN INFORMATION TRANSMISSION- ENCRYPTION AND DECRYPTION

Research Paper Open Access

International Journal of Latest Research in Science and Technology Vol.7 Issue 6, pp 18-22,Year 2018

THE PLACE OF GROUP THEORY ON RECENT TRENDS IN INFORMATION TRANSMISSION- ENCRYPTION AND DECRYPTION

Samuel Hwere Tsok , Augustine Pwasong , Naphtali B. Jelten

Correspondence should be addressed to :

Received : 14 December 2018; Accepted : 10 January 2019 ; Published : 29 January 2019

Share
Download 125
View 184
Article No. 10962
Abstract

Progression in computing powers and parallelism technology are creating obstruction for credible security especially in electronic information swapping under cryptosystems, this led to this paper presenting the several ways in which group theory can be used to construct various key agreement protocols and finally presented the secure signatures with RSA, which enable identity verification during encryption and decryption of information.

Key Words   
Encryption, Decryption, Information transmission, Group Theory, Key agreement protocols and Secure
Copyright
References
  1. Laurence C.  Washington, Ellptic Curves. (second, Ed.) CRC Press, Boca, 2008.
  2. Samuel Hwere Tsok and Patrick N. Okolo, Application of Group Theory to a Local Game Called “Tsorry Checkerboard” (A Case of Klein Four- Group). IOSR-JM, Volume 7, Issue 3, 04-06, 2013.  www.iosrjournals.org
  3. Whitefield Diffie; Martin Hellman. “New directions in cryptography”. Information Theory, IEEE Transactions 22, 644-654, 1976
  4. Alfred J. Menezes and Scott A. Vanstone, A.,  A note on cyclic groups finite fields and the discrete logarithm problem, Application Algebra in Engineering, communication and computing, 3, 67-74, 1992
  5. Norman Biggs, The critical group from a cryptographic perspective, Bull. London Math. Soc. 39, 829–836, 2007
  6. Simon R. Blackburn, Carlos CID and Clarian Mullan. Group Theory in Cryptography a paper presented to the Department of Mathematics, Royal Holloway, University of London Egham, Surrey TW20 OEX, United Kingdom, 2010 {s. blackburn, carlos.cid, c.mullan}@rhul.ac.uk
  7. Steven Galbraith and Alfred Menezes, Algebraic curves and Cryptography, Finite Fields and Application 11, 544-577,  2005.
  8. Neal R. Wagner and Marianne R. Magyarik, A public key cryptosystem Based on the word problem, in Advances in Cryptology- CRYPTO’ 84 ( G.R. Blakely and David Chaum, eds), 19-36, 1985
  9. Mar´ıa Isabel Gonzalez Vasco, and Rainer Steinwandt, A reaction attack on a public key cryptosystem based on the word problem. Applicable Algebra In Engineering, Communication and computing 14, 335-340, 2004 .
  10. Ki, H. Ko, Sang Jin Lee, Jung Hee Cheon, Jae Woo H. Ju-Sung Kang and Choonsik Park, New public-key cryptosystem using braid group, in advances in Cryptology-CRYPTO 2000 (M. Bellare, ed.). Lecture notes in computer 1880, 166-183, 2000.
  11. Iris Anshel, Micheal Anshel, Dorian Goldfeld, An algebraic method for public-key cryptography. Math. And Lightweight cryptography. Contemp. Math 418, 1-34, 1999
  12. Alexei M., Shipilrain, V., Ushakov, A., Group-Based Cryptography Birkhauser, 2008,
  13. Arkdius Kalka, Mina Teicher and Boaz Tsaban, Cryptanalysis of the Algebra Eraser and short expressions of permutations as products’ preprint. http://arxiv.org/abs/0804.0629., 2006.
  14. Eberhard S,  A New method for Exchanging secret keys. Third international conference on Information Technology and Application (ICITA’05) pp 426-430. Piscataway: IEEE, Computer Society, 2005.
  15. David R. Finson and Patrick J. Morandi, An Introduction to Abstract Algebra Via Application, Department of Mathematical Sciences New Mexico State University Las Cruces NM 88003-8001, 2007.
To cite this article

Samuel Hwere Tsok , Augustine Pwasong , Naphtali B. Jelten , " The Place Of Group Theory On Recent Trends In Information Transmission- Encryption And Decryption ", International Journal of Latest Research in Science and Technology . Vol. 7, Issue 6, pp 18-22 , 2018


Responsive image

MNK Publication was founded in 2012 to upholder revolutionary ideas that would advance the research and practice of business and management. Today, we comply with to advance fresh thinking in latest scientific fields where we think we can make a real difference and growth now also including medical and social care, education,management and engineering.

Responsive image

We offers several opportunities for partnership and tie-up with individual, corporate and organizational level. We are working on the open access platform. Editors, authors, readers, librarians and conference organizer can work together. We are giving open opportunities to all. Our team is always willing to work and collaborate to promote open access publication.

Responsive image

Our Journals provide one of the strongest International open access platform for research communities. Our conference proceeding services provide conference organizers a privileged platform for publishing extended conference papers as journal publications. It is deliberated to disseminate scientific research and to establish long term International collaborations and partnerships with academic communities and conference organizers.