Theoretical and Natural Science

- The Open Access Proceedings Series for Conferences


Theoretical and Natural Science

Vol. 10, 17 November 2023


Open Access | Article

Application of modern algebra in cryptography

Yuling Qian * 1
1 Sino-Canada School

* Author to whom correspondence should be addressed.

Theoretical and Natural Science, Vol. 10, 16-20
Published 17 November 2023. © 2023 The Author(s). Published by EWA Publishing
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Citation Yuling Qian. Application of modern algebra in cryptography. TNS (2023) Vol. 10: 16-20. DOI: 10.54254/2753-8818/10/20230304.

Abstract

With the rapid development of the digital age, information security, from personal data to national security, is becoming increasingly crucial. Information security primarily refers to the computation and processing of diverse information in computer systems and information exchange networks in order to safeguard information security. Cryptography is the technical foundation for achieving these objectives. In the early stages of education, advanced mathematics, linear algebra, probability theory, and other fundamental disciplines must be studied, although the practical application of modern algebra, cryptography, number theory, and mathematical knowledge will vary. This study explores the application of current algebra in cryptography, including both traditional and modern cryptographic applications, using a literature review approach. By comparing images from various eras, the researchers discovered that images were classed as "traditional" and "modern" at various times. Moreover, the likelihood of both traditional and modern images being identified throughout the modern era is comparatively higher.

Keywords

modern algebra, cryptography, information security

References

1. Victor Shoup. A Computational Introduction to Number Theory and Algebra. Cambridge University Press, 2015.

2. Neal Koblitz. Algebraic Aspects of Cryptography. Springer, 1998.

3. J.-J. Quisquater and L. Guillou. How to Explain Zero-Knowledge Protocols to Your Children. [3]Advances in cryptology—CRYPTO’89 Proceedings, Springer, 1989, pp. 628-631.

4. David Joyner. Adventures in Group Theory: Rubik’s Cube, Merlin’s Machine, and Other Mathematical Toys. The Johns Hopkins University Press, 2002.

5. Serge Vaudenay. A Classical Introduction to Cryptography: Applications for Communications Security, Springer, 2005.

6. Michiel Kosters. Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings. Springer-Verlag, Berlin, Heidelberg, 2006.

7. Scott Aaronson. Quantum Computing, post-quantum cryptography, and the quest for quantum supremacy. National Science Review, Volume 4, Issue 3, May 2017, Pages 293–299.

8. Gary L. Mullen and Daniel Panario. Handbook of Finite Fields. CRC Press, 2013.

9. Tanja Lange, Daniel J. Bernstein, and Peter Schwabe. Post-Quantum Cryptography. Springer, 2009.

10. Nigel P. Smart. Cryptography: An Introduction. McGraw-Hill, Springer, 2004, pp 50.

Data Availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Authors who publish this series agree to the following terms:

1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.

2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.

3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open Access Instruction).

Volume Title
Proceedings of the 2023 International Conference on Mathematical Physics and Computational Simulation
ISBN (Print)
978-1-83558-131-5
ISBN (Online)
978-1-83558-132-2
Published Date
17 November 2023
Series
Theoretical and Natural Science
ISSN (Print)
2753-8818
ISSN (Online)
2753-8826
DOI
10.54254/2753-8818/10/20230304
Copyright
17 November 2023
Open Access
This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Copyright © 2023 EWA Publishing. Unless Otherwise Stated