Hypercomplex Numbers in Cryptosystems
| dc.contributor.author | Doukhnitch, Evgueni I. | |
| dc.contributor.author | Chefranov, Alexander G. | |
| dc.date.accessioned | 2026-02-06T17:53:50Z | |
| dc.date.issued | 2024 | |
| dc.department | Doğu Akdeniz Üniversitesi | |
| dc.description | International Conference on Current Problems of Applied Mathematics and Computer Systems, CPAMCS 2023 -- 2023-10-04 through 2023-10-08 -- Stavropol -- 318279 | |
| dc.description.abstract | A systematic analysis of the use of the hypercomplex numbers in the construction of the cryptographic algorithms is given. The cases of constructing various types of ciphers, both symmetric and asymmetric, with the use of hypercomplex numbers of 4, 8, and 16 dimensions are considered. These include determining the complex computational problem underlying the security of the cipher. Among block ciphers, modifications of the Hill and Feistel algorithms are considered. Attention is drawn to the use of involutory matrices in the development of the encryption algorithms. Of the public key systems, the review includes hybrid elliptic curve ciphers, scheme based on the computational quaternion conjugacy problem, and NTRU-type systems based on lattices. The research defines the basic principles for the application of hypercomplex numbers in cryptography. The article can help researchers to get a general view of the ways to solve an identified problem. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024. | |
| dc.identifier.doi | 10.1007/978-3-031-64010-0_28 | |
| dc.identifier.endpage | 315 | |
| dc.identifier.isbn | 9789819652372 | |
| dc.identifier.isbn | 9783031931055 | |
| dc.identifier.isbn | 9789819662968 | |
| dc.identifier.isbn | 9783031999963 | |
| dc.identifier.isbn | 9783031950162 | |
| dc.identifier.isbn | 9783031947698 | |
| dc.identifier.isbn | 9783032004406 | |
| dc.identifier.isbn | 9783031910074 | |
| dc.identifier.isbn | 9783032083807 | |
| dc.identifier.isbn | 9783032077172 | |
| dc.identifier.issn | 2367-3370 | |
| dc.identifier.scopus | 2-s2.0-85203869112 | |
| dc.identifier.scopusquality | Q4 | |
| dc.identifier.startpage | 305 | |
| dc.identifier.uri | https://doi.org/10.1007/978-3-031-64010-0_28 | |
| dc.identifier.uri | https://search.trdizin.gov.tr/tr/yayin/detay/ | |
| dc.identifier.uri | https://hdl.handle.net/11129/7115 | |
| dc.identifier.volume | 1044 LNNS | |
| dc.indekslendigikaynak | Scopus | |
| dc.language.iso | en | |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | |
| dc.relation.ispartof | Lecture Notes in Networks and Systems | |
| dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
| dc.rights | info:eu-repo/semantics/closedAccess | |
| dc.snmz | KA_Scopus_20260204 | |
| dc.subject | Cryptographic algorithm | |
| dc.subject | Feistel network | |
| dc.subject | Hill cipher | |
| dc.subject | Hypercomplex number | |
| dc.subject | NTRU-type algorithm | |
| dc.title | Hypercomplex Numbers in Cryptosystems | |
| dc.type | Conference Object |










