Abstract
The main goal of this paper is to exhibit the use of singular matrices over finite fields in cryptography. Using these matrices, we propose a key exchange method in which two users over an insecure channel want to agree upon a secret key to be used in some private key cryptosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Galois, E.: Sur La théorie Des Nombres. Bull. Sci. Math. de M. Ferussac 30, 428–435 (1830)
Koblitz, N.: Elliptic Curve Cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Levine, J., Brawley, J.V.: Some Cryptographic Applications of Permutation Polynomials. Cryptologia 1, 76–92 (1977)
Lidl, R., Muller, W.B.: Permutation Polynomials in Rsacryptosystems. In: Advances in Cryptology, pp. 293–301 (1984)
Massey, J.L.: Shift-register Synthesis and BCH Decoding. IEEE Trans. Information Theory 15, 122–127 (1969)
Schwenk, J., Huber, K.: Public Key Encryption and Digital Signatures Based on Permutation Polynomials. Electronics Letters 34(2), 759–760 (1998)
Berlekamp, E.R.: Algebraic Coding Theory. McGraw-Hill, New York (1968)
Shparlinski, I.E.: Finite Fields: Theory and Computation. Kluwer Academic Publishers, Dordrecht (1999)
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer, Heidelberg (2002)
Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applictions. Cambridge University Press, Cambridge (1994)
Koblitz, N.: Algebraic Aspects of Cryptography. Springer, Heidelberg (1999)
Lidl, R., Niederreiter, H.: Finite Fields: Encyclopedia of Mathematics and Its Applications. Cambridge University Press, Cambridge (1997)
Menezes, A.J., Blake, I.F., Gao, X., Mullin, R.C., Vanstone, S.A.: Applications of Finite Fields. Kluwer Academic Publishers, Dordrecht (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yadav, D.S., Sharma, R.K., Shukla, W. (2011). On Applications of Singular Matrices over Finite Fields in Cryptography. In: Joye, M., Mukhopadhyay, D., Tunstall, M. (eds) Security Aspects in Information Technology. InfoSecHiComNet 2011. Lecture Notes in Computer Science, vol 7011. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24586-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-24586-2_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24585-5
Online ISBN: 978-3-642-24586-2
eBook Packages: Computer ScienceComputer Science (R0)