|
Number theory and applications in cryptography
S. V. Vostokovab, R. P. Vostokovac, S. V. Bezzateevd a Saint Petersburg State University
b Leonhard Euler's Fund of Russian Mathematics Support
c Baltic State Technical University "Voenmech"
d Saint-Petersburg State University of Aerospace Instrumentation
Abstract:
The paper describes some elements of the
number theory and shows how they are used in modern information
security systems. As examples, the most famous protocols and
algorithms such as the Diffie-Hellman Protocol for pair key
generation, RSA and El Gamal public key encryption algorithms.
The generalized Euclid algorithm is considered, as a one of the
most common element of the number theory used in cryptography.
Algorithms are given RSA and El Gamal signature algorithms are
given. In conclusion,
the algorithm of the electronic signature based on
bilinear transformation uses a simplified case of the pairing
in the explicit law of reciprocity.
Keywords:
number theory, cryptography protocols, public key cryptographic algorithms, signature, bilinear transformation.
Received: 01.09.2018 Accepted: 10.10.2018
Citation:
S. V. Vostokov, R. P. Vostokova, S. V. Bezzateev, “Number theory and applications in cryptography”, Chebyshevskii Sb., 19:3 (2018), 61–73
Linking options:
https://www.mathnet.ru/eng/cheb679 https://www.mathnet.ru/eng/cheb/v19/i3/p61
|
Statistics & downloads: |
Abstract page: | 305 | Full-text PDF : | 538 | References: | 33 |
|