{"title":"基于排列的三通道密码协议","authors":"Shcherba Anatoly, Faure Emil, Lavdanska Olha","doi":"10.1109/ATIT50783.2020.9349343","DOIUrl":null,"url":null,"abstract":"The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.","PeriodicalId":312916,"journal":{"name":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Three-Pass Cryptographic Protocol Based on Permutations\",\"authors\":\"Shcherba Anatoly, Faure Emil, Lavdanska Olha\",\"doi\":\"10.1109/ATIT50783.2020.9349343\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.\",\"PeriodicalId\":312916,\"journal\":{\"name\":\"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)\",\"volume\":\"106 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ATIT50783.2020.9349343\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 2nd International Conference on Advanced Trends in Information Theory (ATIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ATIT50783.2020.9349343","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Three-Pass Cryptographic Protocol Based on Permutations
The paper proposes a new principle for the implementation of a three-pass cryptographic protocol. All operations implemented in it are performed on permutations. Such operations are the multiplication of permutations, raising to the power of their disjoint cycles, as well as the operation of finding the conjugate permutation. This avoids the problems associated with discrete logarithms, which can increase the cryptographic strength of the proposed protocol. The developed protocol can be used both for information transmission systems using factorial coding and for traditional systems.