An Application of Co-medial Algebras with Quasigroup Operations on Cryptology
- Department of Mathematics, College of Polymer, Mahshahr Branch, Islamic Azad University, Mahshahr, Iran.
A modification of Markovski quasigroup based crypto-algorytm has been presented. This modification is based on the pair of co-medial quasigroup operations, which we show that they are orthogonal quasigroup operations.
Share and Cite
Amir Ehsani, An Application of Co-medial Algebras with Quasigroup Operations on Cryptology, Journal of Mathematics and Computer Science, 10 (2014), no. 2, 113-118
Ehsani Amir, An Application of Co-medial Algebras with Quasigroup Operations on Cryptology. J Math Comput SCI-JM. (2014); 10(2):113-118
Ehsani, Amir. "An Application of Co-medial Algebras with Quasigroup Operations on Cryptology." Journal of Mathematics and Computer Science, 10, no. 2 (2014): 113-118
- co-medial pair of operations
- quasigroup operation
- orthogonal operations
V. D. Belousov, The group associated with a quasigroup, Mat. Issled., 4(3) (1969), 21 – 39.
A. Ehsani, The Generalized entropic property for the pair of operations, Journal of ContemporaryMathematical Analysis , 46(1) (2011), 29-34.
A. Ehsani , On Regular Co-medial Algebras, J. Mathematics Research , 4(2) (2012), 101-109.
A. Ehsani, On Medial-like Functional Equations, Mathematical Problems of ComputerScience , 38 (2012), 53-55.
A. Ehsani, Yu. M. Movsisyan, Linear Representation of Medial-like Algebras, Communications in Algebra , 41(9) (2013), 3429-3444.
V. Domashev, V. Popov, D. Pravikov, I. Prokof’ev, A. Shcherbakov, Programming of algorithms of defense of information, Nolidge, Moscow (2000)
H. Feistel, Cryptography and computer privacy, Scientific American , 228(5) (1973), 15–23.
S. H. Kamali, M. Hedayati, R. Shakerian, S. Ghasempour, Using Identity-Based Secret Public Keys Cryptography for Heuristic Security Analyses in Grid Computing, The Journal of Mathematics and Computer Science , 3(4) (2011), 357-375.
S. Markovski, D. Gligoroski, S. Andova, Using quasigroups for one-one secure encoding, In Proc. VIII Conf. Logic and Computer Science ”LIRA97”, Novi Sad, (1997), 157–167.
S. Markovski, D. Gligoroski, V. Bakeva, Quasigroup string processing , Part 1, Contributions, Sec. Math. Tech. Sci., MANU, XX, (1-2) (1999), 13–28.
S. Markovski, V. Kusakatov, Quasigroup string processing, Part 2, Contributions, Sec. Math.Tech. Sci., MANU, XXI, (1-2) (2000), 15–32.
A. J. Menezes, P. C. Van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL (1997)
N. A. Moldovyan, Problems and methods of cryptology, S.Petersburg University Press, S.Petersburg (1998)
G. L. Mullen, V. A. Shcherbacov, Onorthogonality of binary operations and squares, BULETINUL ACADEMIEI DE STIINTE A REPUBLICII MOLDOVA. MATEMATICA , 2(48) (2005), 3–42.
H. O. Pflugfelder, Quasigroups and Loops, Introduction,HeldermannVerlag, Berlin (1990)
A. Romanowska, J. D. H. Smith, Modes, World Scientific, River Edge, New Jersey (2002)