Design of Ciphers based on the Geometric Structure of the Laguerre and Minkowski Planes

03/07/2021
by   Christoph Capellaro, et al.
0

Till now geometric structures don't play a major role in cryptography. Gilbert, MacWilliams and Sloane introduced an authentication scheme in the projective plane and showed its perfectness in the sense of Shannon. In arXiv:2102.10321 we introduced an encryption scheme in the Möbius plane and showed that it fulfills Shannon's requirement of perfectness in first approximation and also the requirement of completeness according to Kam and Davida. In this paper we will apply a similar approach to define encryption schemes in the geometries of the Laguerre plande and the Minkowski plane. We will show that the encryption scheme in the Laguerre geometry meets Shannon's requirement of perfectness sharp and that the encryption scheme in the Minkowski geometry meets this requirement in first approximation. The Laguerre cipher also fulfills the requirement of completeness according to Kam and Davida.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/20/2021

Design of Ciphers based on the Geometric Structure of the Möbius Plane

Till now geometric structures don't play a major role in cryptography. G...
research
05/07/2022

Lattices, Homomorphic Encryption, and CKKS

This is a survey on some topics in Lattice based cryptography and Homomo...
research
06/21/2018

Cryptanalysis of a Chaotic Key based Image Encryption Scheme

Security of multimedia data is a major concern due to its widespread tra...
research
05/11/2022

Delay Encryption by Cubing

Delay Encryption (often called Timed-Release Encryption) is a scheme in ...
research
02/15/2010

Geometric approach to sampling and communication

Relationships that exist between the classical, Shannon-type, and geomet...
research
09/23/2022

Authentication and encryption for a robotic ad hoc network using identity-based cryptography

In some situations the communications of a place can be affected, totall...
research
03/19/2023

Geometric Stability Estimates For 3D-Object Encryption Through Permutations and Rotations

We compute precise estimates for dimensions of 3D-encryption techniques ...

Please sign up or login with your details

Forgot password? Click here to reset