Assessing the security of cryptographic primitives for infinite groups
dc.contributor.author | Walter, M.J. | |
dc.date.accessioned | 2020-10-10T20:00:22Z | |
dc.date.available | 2020-10-10T20:00:22Z | |
dc.date.issued | 2020 | |
dc.identifier.citation |
Walter, M.J. (2020) ‘Assessing the security of cryptographic primitives for infinite groups’, The Plymouth Student Scientist, 13(1), p. 432-475. | en_US |
dc.identifier.uri | http://hdl.handle.net/10026.1/16517 | |
dc.description.abstract |
This paper considers the application of group theory to cryptography using a nonabelian infinite group (the braid group). The practical application of cryptographic protocols are determined by their security and feasibility. Both research papers and experiments will be used to measure feasibility and security of the protocol, with the intention of ultimately deeming the protocol either effective or ineffective. Having secure cryptography is vital to providing anonymity, confidentiality and integrity to data and as the quantum threat creeps towards us, the ever greater importance of new secure cryptography is becoming clear. | en_US |
dc.language.iso | en | en_US |
dc.publisher | University of Plymouth | en_US |
dc.rights | Attribution 3.0 United States | * |
dc.rights.uri | http://creativecommons.org/licenses/by/3.0/us/ | * |
dc.subject | cryptographic primitives | en_US |
dc.subject | infinite groups | en_US |
dc.subject | security | en_US |
dc.subject | cryptography | en_US |
dc.subject | non-abelian infinite group | en_US |
dc.subject | braid group | en_US |
dc.subject | anonymity | en_US |
dc.subject | confidentiality | en_US |
dc.subject | integrity to data | en_US |
dc.title | Assessing the security of cryptographic primitives for infinite groups | en_US |
dc.type | Article | en_US |
plymouth.issue | 1 | |
plymouth.volume | 13 | |
plymouth.journal | The Plymouth Student Scientist |