Show simple item record

dc.contributor.authorWalter, M.J.
dc.date.accessioned2020-10-10T20:00:22Z
dc.date.available2020-10-10T20:00:22Z
dc.date.issued2020
dc.identifier.citation

Walter, M.J. (2020) ‘Assessing the security of cryptographic primitives for infinite groups’, The Plymouth Student Scientist, 13(1), p. 432-475.

en_US
dc.identifier.urihttp://hdl.handle.net/10026.1/16517
dc.description.abstract

This paper considers the application of group theory to cryptography using a nonabelian infinite group (the braid group). The practical application of cryptographic protocols are determined by their security and feasibility. Both research papers and experiments will be used to measure feasibility and security of the protocol, with the intention of ultimately deeming the protocol either effective or ineffective. Having secure cryptography is vital to providing anonymity, confidentiality and integrity to data and as the quantum threat creeps towards us, the ever greater importance of new secure cryptography is becoming clear.

en_US
dc.language.isoenen_US
dc.publisherUniversity of Plymouthen_US
dc.rightsAttribution 3.0 United States*
dc.rights.urihttp://creativecommons.org/licenses/by/3.0/us/*
dc.subjectcryptographic primitivesen_US
dc.subjectinfinite groupsen_US
dc.subjectsecurityen_US
dc.subjectcryptographyen_US
dc.subjectnon-abelian infinite groupen_US
dc.subjectbraid groupen_US
dc.subjectanonymityen_US
dc.subjectconfidentialityen_US
dc.subjectintegrity to dataen_US
dc.titleAssessing the security of cryptographic primitives for infinite groupsen_US
dc.typeArticleen_US
plymouth.issue1
plymouth.volume13
plymouth.journalThe Plymouth Student Scientist


Files in this item

Thumbnail
Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

Attribution 3.0 United States
Except where otherwise noted, this item's license is described as Attribution 3.0 United States

All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV