Research Article
Open access
Published on 17 November 2023
Download pdf
Export citation

Application of modern algebra in cryptography

Yuling Qian *,1,
  • 1 Sino-Canada School

* Author to whom correspondence should be addressed.

https://doi.org/10.54254/2753-8818/10/20230304

Abstract

With the rapid development of the digital age, information security, from personal data to national security, is becoming increasingly crucial. Information security primarily refers to the computation and processing of diverse information in computer systems and information exchange networks in order to safeguard information security. Cryptography is the technical foundation for achieving these objectives. In the early stages of education, advanced mathematics, linear algebra, probability theory, and other fundamental disciplines must be studied, although the practical application of modern algebra, cryptography, number theory, and mathematical knowledge will vary. This study explores the application of current algebra in cryptography, including both traditional and modern cryptographic applications, using a literature review approach. By comparing images from various eras, the researchers discovered that images were classed as "traditional" and "modern" at various times. Moreover, the likelihood of both traditional and modern images being identified throughout the modern era is comparatively higher.

Keywords

modern algebra, cryptography, information security

[1]. Victor Shoup. A Computational Introduction to Number Theory and Algebra. Cambridge University Press, 2015.

[2]. Neal Koblitz. Algebraic Aspects of Cryptography. Springer, 1998.

[3]. J.-J. Quisquater and L. Guillou. How to Explain Zero-Knowledge Protocols to Your Children. [3]Advances in cryptology—CRYPTO’89 Proceedings, Springer, 1989, pp. 628-631.

[4]. David Joyner. Adventures in Group Theory: Rubik’s Cube, Merlin’s Machine, and Other Mathematical Toys. The Johns Hopkins University Press, 2002.

[5]. Serge Vaudenay. A Classical Introduction to Cryptography: Applications for Communications Security, Springer, 2005.

[6]. Michiel Kosters. Algorithmic Number Theory: 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings. Springer-Verlag, Berlin, Heidelberg, 2006.

[7]. Scott Aaronson. Quantum Computing, post-quantum cryptography, and the quest for quantum supremacy. National Science Review, Volume 4, Issue 3, May 2017, Pages 293–299.

[8]. Gary L. Mullen and Daniel Panario. Handbook of Finite Fields. CRC Press, 2013.

[9]. Tanja Lange, Daniel J. Bernstein, and Peter Schwabe. Post-Quantum Cryptography. Springer, 2009.

[10]. Nigel P. Smart. Cryptography: An Introduction. McGraw-Hill, Springer, 2004, pp 50.

Cite this article

Qian,Y. (2023). Application of modern algebra in cryptography. Theoretical and Natural Science,10,16-20.

Data availability

The datasets used and/or analyzed during the current study will be available from the authors upon reasonable request.

Disclaimer/Publisher's Note

The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of EWA Publishing and/or the editor(s). EWA Publishing and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

About volume

Volume title: Proceedings of the 2023 International Conference on Mathematical Physics and Computational Simulation

Conference website: https://www.confmpcs.org/
ISBN:978-1-83558-131-5(Print) / 978-1-83558-132-2(Online)
Conference date: 12 August 2023
Editor:Roman Bauer
Series: Theoretical and Natural Science
Volume number: Vol.10
ISSN:2753-8818(Print) / 2753-8826(Online)

© 2024 by the author(s). Licensee EWA Publishing, Oxford, UK. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license. Authors who publish this series agree to the following terms:
1. Authors retain copyright and grant the series right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this series.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the series's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this series.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See Open access policy for details).