Interactions between Group Theory, Symmetry and Cryptology

Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebra...

Full description

Saved in:
Bibliographic Details
:
Year of Publication:2020
Language:English
Physical Description:1 electronic resource (164 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993548177704498
ctrlnum (CKB)4100000011302271
(oapen)https://directory.doabooks.org/handle/20.500.12854/50457
(EXLCZ)994100000011302271
collection bib_alma
record_format marc
spelling González Vasco, María Isabel auth
Interactions between Group Theory, Symmetry and Cryptology
MDPI - Multidisciplinary Digital Publishing Institute 2020
1 electronic resource (164 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.
English
NP-Completeness
protocol compiler
post-quantum cryptography
Reed–Solomon codes
key equation
euclidean algorithm
permutation group
t-modified self-shrinking generator
ideal cipher model
algorithms in groups
lightweight cryptography
generalized self-shrinking generator
numerical semigroup
pseudo-random number generator
symmetry
pseudorandom permutation
Berlekamp–Massey algorithm
semigroup ideal
algebraic-geometry code
non-commutative cryptography
provable security
Engel words
block cipher
cryptography
beyond birthday bound
Weierstrass semigroup
group theory
braid groups
statistical randomness tests
group-based cryptography
alternating group
WalnutDSA
Sugiyama et al. algorithm
cryptanalysis
digital signatures
one-way functions
key agreement protocol
error-correcting code
group key establishment
3-03928-802-4
language English
format eBook
author González Vasco, María Isabel
spellingShingle González Vasco, María Isabel
Interactions between Group Theory, Symmetry and Cryptology
author_facet González Vasco, María Isabel
author_variant v m i g vmi vmig
author_sort González Vasco, María Isabel
title Interactions between Group Theory, Symmetry and Cryptology
title_full Interactions between Group Theory, Symmetry and Cryptology
title_fullStr Interactions between Group Theory, Symmetry and Cryptology
title_full_unstemmed Interactions between Group Theory, Symmetry and Cryptology
title_auth Interactions between Group Theory, Symmetry and Cryptology
title_new Interactions between Group Theory, Symmetry and Cryptology
title_sort interactions between group theory, symmetry and cryptology
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2020
physical 1 electronic resource (164 p.)
isbn 3-03928-803-2
3-03928-802-4
illustrated Not Illustrated
work_keys_str_mv AT gonzalezvascomariaisabel interactionsbetweengrouptheorysymmetryandcryptology
status_str n
ids_txt_mv (CKB)4100000011302271
(oapen)https://directory.doabooks.org/handle/20.500.12854/50457
(EXLCZ)994100000011302271
carrierType_str_mv cr
is_hierarchy_title Interactions between Group Theory, Symmetry and Cryptology
_version_ 1796649042509299713
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03665nam-a2200733z--4500</leader><controlfield tag="001">993548177704498</controlfield><controlfield tag="005">20231214133644.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202102s2020 xx |||||o ||| 0|eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3-03928-803-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4100000011302271</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/50457</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994100000011302271</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">González Vasco, María Isabel</subfield><subfield code="4">auth</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Interactions between Group Theory, Symmetry and Cryptology</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (164 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NP-Completeness</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">protocol compiler</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post-quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Reed–Solomon codes</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">key equation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">euclidean algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">permutation group</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">t-modified self-shrinking generator</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">ideal cipher model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">algorithms in groups</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lightweight cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">generalized self-shrinking generator</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">numerical semigroup</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">pseudo-random number generator</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">symmetry</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">pseudorandom permutation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Berlekamp–Massey algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">semigroup ideal</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">algebraic-geometry code</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">non-commutative cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">provable security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Engel words</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">block cipher</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">beyond birthday bound</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Weierstrass semigroup</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">group theory</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">braid groups</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">statistical randomness tests</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">group-based cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">alternating group</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">WalnutDSA</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sugiyama et al. algorithm</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cryptanalysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">digital signatures</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">one-way functions</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">key agreement protocol</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">error-correcting code</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">group key establishment</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-03928-802-4</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 06:01:31 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2020-06-20 22:16:43 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5338745870004498&amp;Force_direct=true</subfield><subfield code="Z">5338745870004498</subfield><subfield code="b">Available</subfield><subfield code="8">5338745870004498</subfield></datafield></record></collection>