Quasigroups in cryptology

@article{Shcherbacov2009QuasigroupsIC,
  title={Quasigroups in cryptology},
  author={Victor A. Shcherbacov},
  journal={Comput. Sci. J. Moldova},
  year={2009},
  volume={17},
  pages={193-228}
}
  • V. Shcherbacov
  • Published 21 July 2010
  • Mathematics, Computer Science
  • Comput. Sci. J. Moldova
We give a review of some known published applications of quasi- groups in cryptology. Keywords: cryptology, quasigroup, (r,s,t)-quasigroup, stream- cipher, secret-sharing system, zero knowledge protocol, authen- tication of a message, NLPN sequence, Hamming distance. 
Quasigroup based crypto-algorithms
TLDR
Modifications of Markovski quasigroup based crypto-algorithm have been proposed, some of which are based on the systems of orthogonal n-ary groupoids.
On some quasigroup cryptographical primitives
Using Vojvoda approach [34] we demonstrate that cryptographical primitives proposed in [26] are vulnerable relative to chosen ciphertext attack and chosen plaintext attack. We develop proposed in
Block Cipher Defined by Matrix Presentation of Quasigroups
TLDR
This paper introduces a block cipher based on the quAsigroup transformations, which are defined by the matrix presentation of the quasigroup operations, which is suitable for constructing a block Cipher since it doesn’t require too much memory space to store all the necessary data.
Design of crypto primitives based on quasigroups Smile Markovski
TLDR
This survey article will present how quasigroups can be used for construction of various crypto primitives, and especially what type of quAsigroups are used and how they can be constructed.
Super Optimal S-boxes Based on Pure Non-linear 3-quasigroups
TLDR
The methodology is based on 3-quasigroup operations and it enables someone to get 44-bit S-boxes optimal in all the above four properties that PRESENT S-box has.
Post-Quantum Cryptography: A Zero-Knowledge Authentication Protocol
  • P. Hecht
  • Mathematics, Computer Science
    ArXiv
  • 2017
TLDR
A simple bare-bones solution of a Zero-Knowledge authentication protocol which uses non-commutative algebra and a variation of the generalized symmetric decomposition problem (GSDP) as a one-way function is presented.
New Developments in Quasigroup-Based Cryptography
TLDR
This chapter offers an overview of new developments in quasigroup-based cryptography, especially of new defined quasGovernments, including Multivariate Quadratic Quasigroups and MQQ public key schemes, because of their potential to become one of the most efficient pubic key algorithms today.
Non-associative public-key cryptography
  • A. Kalka
  • Mathematics, Computer Science
    AMS-EMS-SPM Joint Meeting
  • 2016
TLDR
It is shown that left selfdistributive systems appear in a natural special case of a generalized AAG-KEP for magmas, and it is proposed, among others instances, concrete realizations using $f$-conjugacy in groups and shifted conjugacy in braid groups.
An analogue of the ElGamal scheme based on the Markovski algorithm
TLDR
This paper gives an analogue of the ElGamal encryption system based on the Markovski algorithm and states that it can be assigned to either the H2O/H2O or H2S/M2M bands.
Latin quandles and applications to cryptography
TLDR
Four distinct cores of an Osborn loop (non-diassociative and non-power associative) were introduced and investigated and the necessary and sufficient conditions for these cores to be quasi-Latin quandles and involutory quandle were established.
...
1
2
3
...

References

SHOWING 1-10 OF 153 REFERENCES
ON SOME KNOWN POSSIBLE APPLICATIONS OF QUASIGROUPS IN CRYPTOLOGY
It is surveyed known (published) possible application of binary and n-ary quasigroups in cryptology. Mathematics Subject Classification: 20N05, 94A60.
A Quasigroup Based Cryptographic System
TLDR
It is shown that the output of the encryptor maximizes the output entropy and the encrypted output for constant and random inputs is very similar.
Non-associative algebraic system in cryptology. Protection against "meet in the middle" attack
TLDR
An algorithm of zero knowledge proof based on Latin squares, which have a further property that is stronger than the pan-Hamiltonian squares: Every pair of DLm(n) rows and columns is a cycle of length n, if n is prime.
Generating quasigroups for cryptographic applications
A method of generating a practically unlimited number of quasigroups of a (theoretically) arbitrary order using the computer algebra system Maple 7 is presented. This problem is crucial to
Braid-based cryptography
We survey some of the recently developed cryptographic schemes involving Artin’s braid groups, as well as the attacks against these schemes. We also point out some hints for future work.
Algebraic Cryptanalysis of MQQ Public Key Cryptosystem by MutantXL
TLDR
This paper cryptanalysis breaks MQQ cryptosystems by solving systems of multivariate quadratic polynomial equations using a modified version of the MutantXL algorithm.
A Source of Cryptographically Strong Permutations for Use in Block Ciphers
  • L. Mittenthal
  • Mathematics, Computer Science
    Proceedings. IEEE International Symposium on Information Theory
  • 1993
This paper suggests a scheme in which cryptographically strong permutations can be randomly selected from a large proper subset of the permutations on blocks of binary numbers which have certain
Edon-R, An Infinite Family of Cryptographic Hash Functions
TLDR
A new inflnite family of cryptographic hash functions, Edon{R, is proposed, based on a recently deflned candidate one-way function, deflning using quasigroups and quasigroup string transformations.
All-or-Nothing Transforms Using Quasigroups
TLDR
A method of constructing random quasigroups and a way of using the advantages of quasigroup in Rivest's method makes the method faster and maintains the advantages against brute-force attacks.
New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups
TLDR
Two possible approaches to the construction of new public key cryptosystems with message space a large finite group G, using logarithmic signature s and their generalizations are described.
...
1
2
3
4
5
...