UPM Institutional Repository

Finite and infinite field cryptography analysis and applications


Citation

Mohammed G. Al-Saidi, Nadia and Md. Said, Mohamad Rushdan and Mohammed, Arkan J. (2012) Finite and infinite field cryptography analysis and applications. In: International Conference on Applied Mathematics and Pharmaceutical Sciences (ICAMPS'2012), 7-8 Jan. 2012, Dubai. (pp. 587-591).

Abstract

Most of the currently used cryptosystems are defined over finite fields and use modular arithmetic. Their security is often based on the difficulty of solving certain number theoretic problems. In recent years, a large amount of work for introducing of systems defined on infinite field in the design of new cryptosystems has been published. Many studies have been done by introducing of chaotic and fractal functions into the design of symmetric and asymmetric encryption scheme. This paper aims to discuss the advantages and drawbacks of using these new types of mathematics methods behind computer and network security that emerge as a result of integrating between communication and information sciences. In this paper the analysis and the comparison studies between these two disciplines is discussed in terms of their efficiency and security, to identify a common framework for the guidelines that address main issues for implementation and security analysis. Conclusions on their performance are inferred.


Download File

[img] PDF (Full text)
39922.pdf - Published Version
Restricted to Repository staff only

Download (783kB)

Additional Metadata

Item Type: Conference or Workshop Item (Paper)
Divisions: Institute for Mathematical Research
Keywords: Fractal; Chaos; Private key; Public key
Depositing User: Erni Suraya Abdul Aziz
Date Deposited: 20 Aug 2015 06:33
Last Modified: 20 Aug 2015 06:35
URI: http://psasir.upm.edu.my/id/eprint/39922
Statistic Details: View Download Statistic

Actions (login required)

View Item View Item