Handbook of Intelligent Computing and Optimization for Sustainable Development. Группа авторов

Чтение книги онлайн.

Читать онлайн книгу Handbook of Intelligent Computing and Optimization for Sustainable Development - Группа авторов страница 50

Handbook of Intelligent Computing and Optimization for Sustainable Development - Группа авторов

Скачать книгу

If q = 1, det(M) = m11.

       • If q > 1, .

      where Mij stands for a matrix M defined by ith row and jth column. The determinant may be found only for an equivalent matrix.

      Additive Inverse. If matrix N is “the additive inverse” of matrix M, then M + N = 0 because their corresponding elements have the property: nij = −mij for all is and js. The symbol –M is generally used to represent the additive inverse of matrix M [5].

      Multiplicative Inverse. Only square matrices can be used to compute “the reciprocal of a matrix”. Matrix M has a reciprocal of N, resulting in M × N = N × M = I. The symbol M-1 is generally used to represent a reciprocal of M. The matrices have their reciprocals in the case of det(M) ≠ 0 [5].

      4.5.1 Introduction

      The “elliptic curve” in a finite field known as E(GF) is a curve in cubic-form derived from the Weierstrass equation: y2 + β1xy + β3y = x3 + β2x2 + β4x + β6 in GF. In this case, βiGF and GF is a finite field [4].

      The curve E(GF(p)) has the form: y2 = x3 + ax + b in which p is a prime greater than 3, a, bGF(p) and 4a3 + 27b2 ≠ 0. (β1 = β2 = β3 = 0; β4 = a and β6 = b on the Weierstrass equation) [4].

      4.5.2 Arithmetic Operations on E(GF(p))

Graph depicts about adding the points P equals to M plus N. Graph depicts about doubling a point P equals M plus M.

      The algebraic methods for adding points and doubling a point on E(GF(p)) are followings [4].

       • M + O = O + M = M and M + (−M) = O for any point, M ∈ E(GF(p)). If M = (x, y) ∈ E(GF(p)), then (x, −y) is defined as (−M) which stands for the inverse of M. O is the point at infinity which is known as additive identity.

       • (Adding points). Consider that M, N ∈ E(GF(p)), M = (x1, y1), and N = (x2, y2) on the condition: M ≠ ±N. Then, M + N = (x3, y3) in which x3 = λ2 − x1 – x2, y3 = λ(x1 – x3) – y1, and λ(y2 – y1) / (x2 – x1).

       • (Doubling a point). Consider that M = (x1, y1) ∈ E(GF(p)) on the condition: M ≠ −M. Then, 2M = (x3, y3) in which x3 = λ2 – 2x1, y3 = λ(x1 – x3) – y1, and λ = (3x12 + a)2y1.

      4.6.1 Hill Cipher

      In standard ciphers, based on matrix transformations, such as Hill cipher, “residue matrices” on the plane made of complex numbers may be used to construct non-linear cryptographic transformations. The implementation and the analysis on their mathematical properties are described in the reference [9].

      The encryption scheme in Hill Cipher uses a linear matrix transformation to translate plaintext to ciphertext [5]: C = P × K, where P represents “a plaintext matrix”, K represents “a key matrix”, and C represents “a ciphertext matrix”. “A plaintext matrix” is opened by transforming: P = C × K−1, satisfying K × K−1 = I.

      “Affine Hill cipher extends the concept of Hill cipher by integrating it with a nonlinear affine transformation” [10]. The encryption scheme follows the nonlinear transformation of matrices: C = (P × K) + E where P represents “a plain-text matrix”, K represents “a key matrix”, E represents “an embedded matrix”, and C represents “a ciphertext matrix”. “A plaintext matrix” is opened by transforming: P = (CE) × K−1, satisfying K × K−1 = I.

      On the plane made of complex numbers, a new design of Hill cipher is created. Matrix transformations, affine transformations, and complex transformations are used to create the current concept. As a result, the cipher’s diffusion and confusion properties are greater than those of the standard Hill cipher applied to real numbers. It has the potential to defend against both “known-plaintext” and “chosen-plaintext attacks”.

      4.6.2 Elliptic Curve Cryptography

Скачать книгу