Algebraic Structures and Their Applications in Modern Cryptography

Authors

  • Annu Student Department of Mathematics

DOI:

https://doi.org/10.36676/irt.v10.i3.1433

Keywords:

Algebraic Structures, Modern Cryptography, Groups, Rings, Fields

Abstract

Modern cryptography relies heavily on the principles of algebraic structures to ensure the security and integrity of data. This paper explores the fundamental algebraic structures that underpin contemporary cryptographic systems, including groups, rings, fields, and lattices. We provide a detailed examination of how these structures are employed in various cryptographic algorithms and protocols, such as public-key cryptography, digital signatures, and hash functions. an overview of basic algebraic concepts and their properties, followed by an in-depth analysis of their applications in cryptographic schemes. For instance, the use of elliptic curve groups in Elliptic Curve Cryptography (ECC) offers enhanced security with smaller key sizes compared to traditional systems like RSA. Similarly, lattice-based cryptography presents promising solutions for post-quantum security, leveraging the hardness of lattice problems to resist attacks by quantum computers. the role of algebraic structures in the development of advanced cryptographic techniques, such as homomorphic encryption, which allows computations on encrypted data without decryption, and zero-knowledge proofs, which enable the verification of information without revealing the information itself. Through these examples, we illustrate the critical importance of algebraic structures in achieving robust and efficient cryptographic systems.

References

Balami, S., & Koirala, P. (2024). Capital Structure and Profitability: Moderating Role of Firm’s Size. Nepalese Journal of Management Science and Research, 7(1), 179–197. Retrieved from https://www.nepjol.info/index.php/njmsr/article/view/64616

Boneh, D., & Shoup, V. (2017). A Graduate Course in Applied Cryptography. Cambridge University Press.

Katz, J., & Lindell, Y. (2020). Introduction to Modern Cryptography (3rd ed.). CRC Press.

Koirala, Prakriti & Koirala, Digvijaya & Timsina, Baburam. (2024). STUDY ON JOB SATISFACTION AMONG THE EMPLOYEES OF NEPAL RASTRA BANK (NRB).

M.S.Kamalaveni, E.Jothi, E.Saranya, Prakriti Koirala, M. Nateshraja, K. S.Sumsudeen, V. Vignesh raj. (2024). A STUDY ON INVESTOR PERCEPTION TOWARDS SELECTING MUTUAL FUND SCHEMES WITH SPECIAL REFERENCE TO SALEM. African Journal of Biological Sciences. 6(SI2), 5419-5429. DOI: https://doi.org/10.48047/AFJBS.6.Si2.2024.5419-5429

Parameshwar Reddy Kothamali, Vinod Kumar Karne, & Sai Surya Mounika Dandyala. (2024). Integrating AI and Machine Learning in Quality Assurance for Automation Engineering. International Journal for Research Publication and Seminar, 15(3), 93–102. https://doi.org/10.36676/jrps.v15.i3.1445

Silverman, J. H. (2009). The Arithmetic of Elliptic Curves (2nd ed.). Springer-Verlag.

Stinson, D. R., & Paterson, M. (2019). Cryptography: Theory and Practice (4th ed.). CRC Press.

Washington, L. C. (2003). Elliptic Curves: Number Theory and Cryptography. CRC Press.

Micciancio, D., & Goldwasser, S. (2002). Complexity of Lattice Problems: A Cryptographic Perspective. Springer-Verlag.

Galbraith, S. D. (2012). Mathematics of Public Key Cryptography. Cambridge University Press.

Hoffstein, J., Pipher, J., & Silverman, J. H. (2008). An Introduction to Mathematical Cryptography. Springer-Verlag.

Shor, P. W. (1994). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 124-134.

Nielsen, M. A., & Chuang, I. L. (2010). Quantum Computation and Quantum Information (10th Anniversary ed.). Cambridge University Press.

Buchmann, J. (2004). Introduction to Cryptography (2nd ed.). Springer-Verlag.

Downloads

Published

2024-07-25
CITATION
DOI: 10.36676/irt.v10.i3.1433
Published: 2024-07-25

How to Cite

Annu. (2024). Algebraic Structures and Their Applications in Modern Cryptography. Innovative Research Thoughts, 10(3), 52–59. https://doi.org/10.36676/irt.v10.i3.1433