Algebraic Structures and Its Applications in Cryptography

Total Page:16

File Type:pdf, Size:1020Kb

Algebraic Structures and Its Applications in Cryptography Algebraic Structures and its Applications in Cryptography Dr. Sucheta Chakrabarti Scientist - G Scientific Analysis Group DRDO Delhi E-mail – [email protected] 29/8/2020 IC-W 2020 Outline of the Presentation • Secure Communication & Cryptography • Role of probability and entropy in secure communication from information theoretic approach • Commonly used Algebraic Structures in Cryptography • New Direction of (in) Cryptography based on Non-commutative / Non- associative Algebraic Structures • Quaigroups • Quasigroup –Based Transformations and its cryptographic applications 29/8/2020 IC-W 2020 Secure Communications Over Open Channels Aim : To Protect Information To coordinate operations ( command and control ) To carry out online business transaction ( E- commerce ) Service required for secure communication – • Data confidentiality : It ensures the privacy of data i.e only the authorized person can only access the information • Data Integrity : It ensures the protection from any unauthorized alteration i.e. no insertion, deletion or modification has been done in the information by Non-legitimate party .It provides the assurance that the data is present in its original form as it was sent by the sender. 29/8/2020 IC-W 2020 • Data availability : This means that the data is always available for access whenever required • Authentication : This ensures that the communication is being held among the right individuals. • Non-repudiation : According to this, the sender or the receiver cannot deny being responsible for the data being transmitted. 29/8/2020 IC-W 2020 Fundamental building block of security is Cryptography 1949 is the turning point for cryptography – it turns to scientific based on mathematical grounds by the research article Communication Theory of secrecy system - C.E. Shannon 29/8/2020 IC-W 2020 • Security needs continuous improvement / up gradation against adversary capabilities viz. (i) computational • Computationally unbounded – Unconditional security ( Info. theoretical or perfect secrecy ) • Computationally bounded – Computational security & Provable security (the cryptographic primitive reduced to certain problem which is proved to be (well known )hard problem . It implies breaking of the primitive computationally infeasible ) (ii) other capabilities - • Active - can corrupt parties, inject / modify messages • Passive / eavesdropper – only listens (intercepts) messages • Other resources i.e. ability to decrypt some messages. • Security is based on Arbitrary Adversary Principle (AAP ) – i.e it assume restrictions on adversary capabilities , but not that the adversary is using specific strategies or attacks • Secure electronic identities and information protection are key for digital evolution 29/8/2020 IC-W 2020 In the Modern digital world Cryptography ( Crypto-primitives / algorithms ) deals with information security & secure communications over insecure channels. Mainly deals with Confidentiality , Authenticity , Integrity & Non-repudiation It needs set of elements and specific operations that are applied to the elements of the set is called Algebraic Structures 29/8/2020 IC-W 2020 Basic Components of Cryptography Functions • one – one • one-way • trapdoor one way • encryption / decryption 29/8/2020 IC-W 2020 Encryption/Decryption function has to satisfy the following condition : For E∈ E and 푘푒 ≡ 푒 ∈ 풦 , 퐸푒 : ℳ → 풞 is a 1-1 mapping & so there exists a corresponding D ∈ D and 푘푑 ≡ 푑 ∈ 풦 such that 퐷푑 : 풞 → ℳ and 퐷푑 퐸푒 푚 = 푚 푓표푟 푎푙푙 푚 ∈ ℳ In other words Cryptographic Algorithms - consist of ℳ , 풞, 풦 and set 퐸푒, 푒 ∈ 풦 of encryption transformations and corresponding set 퐷푑, 푑 ∈ 풦 of decryption transformations with the property that for −1 each 푒 ∈ 풦 there exists a unique , 푑 ∈ 풦 s.t 퐷푑 ≡ 퐸푒 i.e 퐷푑 퐸푒 푚 = 푚 푓표푟 푎푙푙 푚 ∈ ℳ 29/8/2020 IC-W 2020 Domain & Codomain of Encryption / Decryption Functions • Alphabet set - A • Message space - ℳ • Crypt space - 풞 • Key space - 풦 Set of encryption and decryption functions are denoted by E & D respectively 29/8/2020 IC-W 2020 Cryptosystems Three Sets : Message / Plaintext – ℳ Ciphertext - 풞 Keys - 풦 Three randomized algorithms : 퐾퐺, 퐸, 퐷 Key generation Algo 퐾퐺: 푆∗ → 풦 Encryption Algo 퐸: 풦 × ℳ → 풞 Decryption Algo 퐷 ∶ 풦 × 풞 → ℳ For any key 푘 ∈ 풦 and 푚 ∈ ℳ holds 퐷푘 퐸푘 푚 = 푚 So a cryptosystem consists of five tuples which represent as ℳ, 풞 , 풦 , 퐸, 퐷 29/8/2020 IC-W 2020 Probability & Entropy Concepts for Secure Communication The concept of entropy has evolved in probability theory to create information theoretical model for secure communication . In 1947-48 by classic work of C. Shannon gives birth of Information theory , a new branch in applied probability theory to handle practical problem of communication. Security generally expressed in terms of probability and amount of information (entropy) Here we will discuss some important concepts of discrete probabilities Probability Space : 핏, 푃푟 , where • 핏 − the sample space which is a finite set of possible outcomes ( events) • 푃푟 – a function from 풫 핏 → 0,1 such that 푃푟 핏 = 1, 푃푟 Φ = 0, 푃푟 푋 ∪ 푌 = 푃푟 푋 + 푃푟 푌 if 푋 ∩ 푌 = Φ (iv) 푃푟 푋 ∩ 푌 = 푃푟 푋 푃푟 푌 if 푋 ∩ 푌 = Φ 푃푟 is called a probability distribution , a probability measure or just a probability 푃푟 of X ∈ 풫 핏 determined by 푃푟 푥 ∀ 푥 ∈ 푋 29/8/2020 IC-W 2020 Joint Probabilities : Two probability spaces viz. 핏, 푃푟1 핐, 푃푟2 It can create joint probability space 핏 × 핐, 푃푟 where 푃푟 define as follows: 푃푟 푥, 푦 = 푃푟1 푥 푃푟2 푦 Conditional Probability • 푃푟 푋 푌 = 푃푟 푋 ∩ 푌 /푃푟 푌 - only defined if 푃푟 푌 > 0 • 푋 and 푌 are independent if 푃푟 푋 = 푥|푌 = 푦 = Pr 푋 = 푥 or 푃푟 푥| 푦 = 푃푟 푥 & also 푃푟 푋 = 푥 ∩ 푌 = 푦 = Pr 푋 = 푥 Pr 푌 = 푦 ∀푥, 푦 푃푟 푋 푃푟(푌|푋) Bayes Theorem : 푃푟 푋|푌 = 푃푟 푌 29/8/2020 IC-W 2020 Random Variables • A random variable 푋 is a function from underlying set of probability space (all possible outcomes 핏 ) to some set of values ( some set of 풫 핏 ) • Given a probability space and a random variable 푋, the probability that the random variable 푋 takes value 푥 is 푃푟 푤 푋 푤 = 푥 29/8/2020 IC-W 2020 Application to Cryptography for security analysis Plaintext Distribution : • 푋 discrete random variable over the plaintext set ℳ • Sender choose 푥 from ℳ based on some probability distribution - Let Pr 푋 = 푥 be the probability that 푥 is chosen - This probability may depend on the language Key Distribution: Sender & Receiver agree on a key 푘 chosen from a key set 풦 • 퐾 discrete random variable over 풦 • Pr 퐾 = 푘 ,the probability that 푘푒푦 푠 푘 Note that here Probability space ( Plaintext , Key) 29/8/2020 IC-W 2020 Ciphertext Probability Distribution 푌 is a discrete random variable over the set 풞 The probability of obtaining a particular ciphertext 푦 depends on the probability of Plaintext and key - 푃푟 푦 = σ 푃푟 푥 푃푟(푘) = σ 푃푟 푘 푃푟(푑 (y)) 푥,푘|푒푘 푥 =푦 푘 푘 Attacker Aims to determine the plaintext 푥 • Attacker’s does not know /observe ciphertext 푦 o Probability (a priori probability ) that the plaintext is 푥 : 푃푟 푋 = 푥 ≡ Pr(푥) o It depends on plaintext distribution i.e language characteristics • Attacker’ s knows / observes ciphertext 푦 o Probability ( a posteriori probability)that the plaintext is 푥– 푃푟 푋 = 푥|푌 = 푦 ≡ 푃푟 푥|푦 Computation of attacker’s a posterior (conditional) probabilities • Apply Bayes theorem 29/8/2020 IC-W 2020 푃푟 푋 = 푥|푌 = 푦 ≡ 푃 푟 푥|푦 푃푟 푥 ×푃푟 푦|푥 = 푃푟 푦 Here 푃푟 푥 - Probability of the plaintext 푃푟 푦 - Probability of this ciphertext –It induced by probability of plaintext and key distributions 푃푟 푦 = ෍ 푃푟 푥 푃푟 푘 푥,푘|푒푘 푥 =푦 푃푟 푦|푥 - probability that the 푦 is obtained for a given 푥 depends on the keys which provide such a mapping from plaintext domain (Message space ) to ciphertext domain (Cipher space) - 푃푟 푦|푥 = ෍ 푃푟 푘 푘|푒푘 푥 =푦 표푟푑푘 푦 =푥 29/8/2020 IC-W 2020 Example : A Cryptosystem is given below : ℳ − 푀푒푠푠푎푔푒 푆푝푎푐푒 푎, 푏, 푐 , 풦 − 퐾푒푦 푆푝푎푐푒 푘1, 푘2 & 풞 − 퐶푟푦푝푡 푆푝푎푐푒 푃, 푄, 푅 Plaintext Distribution 1 1 1 Plaintext Probability - 푃푟 푎 = , 푃푟 푏 = , 푃푟 푐 = 2 3 6 3 1 Key Probability - 푃푟 푘 = , 푃푟 푘 = 1 4 2 4 Encryption (mapping) under the keys : 푒푘1 푎 = 푅, 푒푘1 푏 = 푄, 푒푘1 푐 = 푃 푒푘2 푎 = 푄, 푒푘2 푏 = 푅, 푒푘2 푐 = 푃 29/8/2020 IC-W 2020 Attackers knowing the system and plaintext & key probabilities can compute 푃푟 푦 1 3 1 1 1 ⇒ 푃푟 푃 = σ 푃푟 푥 푃푟 푘 = 푃푟 푐 푃푟 푘 + 푃푟 푐 푃푟 푘 = × + × = 푥,푘|푒푘 푥 =푦 1 2 6 4 6 4 6 1 3 1 1 3 푃푟 푄 = × + × = 3 4 2 4 8 1 3 1 1 11 푃푟 푅 = × + × = 2 4 3 4 24 푃푟 푦|푥 , i.e 푃푟 푃|푎 = 0, 푃푟 푃|푏 = 0 , 푃푟 푃|푐 = 푃푟 푘1 + 푃푟 푘2 =1 1 3 푃푟 푄|푎 = , 푃푟 푄|푏 = , 푃푟 푄|푐 =0, 4 4 3 1 푃푟 푅|푎 = , 푃푟 푅|푏 = , 푃푟 푅|푐 = 0 4 4 1 9 ⇒ Posterior probability 푃푟 푎|푃 = 0, 푃푟 푎|푄 = , 푃푟 푎|푅 = , 푃푟 푏|푃 = 0, 3 11 2 2 푃푟 푏|푃 = 0 , 푃푟 푏|푄 = , 푃푟 푏|푅 = , 3 11 푃푟 푐|푃 = 1, 푃푟 푐|푄 = 0, 푃푟 푐|푅 = 0 29/8/2020 IC-W 2020 Attacker if observes ciphertext 푃 then he knows that the plaintext is exactly 푐 Attacker if observes ciphertext 푅 then he knows the most probable plaintext is 푎 The cryptosystem not providing strong security To provide perfect secrecy, the cryptosystem has to satisfies the following condition 푃r 푋 = 푥 ≡ 푃푟 푥 = 푃푟 푋 = 푥|푌 = 푦 ≡ 푃 푟 푥|푦 ∀푥, 푦 i.e.
Recommended publications
  • On Free Quasigroups and Quasigroup Representations Stefanie Grace Wang Iowa State University
    Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2017 On free quasigroups and quasigroup representations Stefanie Grace Wang Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Mathematics Commons Recommended Citation Wang, Stefanie Grace, "On free quasigroups and quasigroup representations" (2017). Graduate Theses and Dissertations. 16298. https://lib.dr.iastate.edu/etd/16298 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. On free quasigroups and quasigroup representations by Stefanie Grace Wang A dissertation submitted to the graduate faculty in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Major: Mathematics Program of Study Committee: Jonathan D.H. Smith, Major Professor Jonas Hartwig Justin Peters Yiu Tung Poon Paul Sacks The student author and the program of study committee are solely responsible for the content of this dissertation. The Graduate College will ensure this dissertation is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2017 Copyright c Stefanie Grace Wang, 2017. All rights reserved. ii DEDICATION I would like to dedicate this dissertation to the Integral Liberal Arts Program. The Program changed my life, and I am forever grateful. It is as Aristotle said, \All men by nature desire to know." And Montaigne was certainly correct as well when he said, \There is a plague on Man: his opinion that he knows something." iii TABLE OF CONTENTS LIST OF TABLES .
    [Show full text]
  • Quasigroup Identities and Mendelsohn Designs
    Can. J. Math., Vol. XLI, No. 2, 1989, pp. 341-368 QUASIGROUP IDENTITIES AND MENDELSOHN DESIGNS F. E. BENNETT 1. Introduction. A quasigroup is an ordered pair (g, •), where Q is a set and (•) is a binary operation on Q such that the equations ax — b and ya — b are uniquely solvable for every pair of elements a,b in Q. It is well-known (see, for example, [11]) that the multiplication table of a quasigroup defines a Latin square, that is, a Latin square can be viewed as the multiplication table of a quasigroup with the headline and sideline removed. We are concerned mainly with finite quasigroups in this paper. A quasigroup (<2, •) is called idempotent if the identity x2 = x holds for all x in Q. The spectrum of the two-variable quasigroup identity u(x,y) = v(x,y) is the set of all integers n such that there exists a quasigroup of order n satisfying the identity u(x,y) = v(x,y). It is particularly useful to study the spectrum of certain two-variable quasigroup identities, since such identities are quite often instrumental in the construction or algebraic description of combinatorial designs (see, for example, [1, 22] for a brief survey). If 02? ®) is a quasigroup, we may define on the set Q six binary operations ®(1,2,3),<8)(1,3,2),®(2,1,3),®(2,3,1),(8)(3,1,2), and 0(3,2,1) as follows: a (g) b = c if and only if a <g> (1,2, 3)b = c,a® (1, 3,2)c = 6, b ® (2,1,3)a = c, ft <g> (2,3, l)c = a, c ® (3,1,2)a = ft, c ® (3,2, \)b = a.
    [Show full text]
  • Right Product Quasigroups and Loops
    RIGHT PRODUCT QUASIGROUPS AND LOOPS MICHAEL K. KINYON, ALEKSANDAR KRAPEZˇ∗, AND J. D. PHILLIPS Abstract. Right groups are direct products of right zero semigroups and groups and they play a significant role in the semilattice decomposition theory of semigroups. Right groups can be characterized as associative right quasigroups (magmas in which left translations are bijective). If we do not assume associativity we get right quasigroups which are not necessarily representable as direct products of right zero semigroups and quasigroups. To obtain such a representation, we need stronger assumptions which lead us to the notion of right product quasigroup. If the quasigroup component is a (one-sided) loop, then we have a right product (left, right) loop. We find a system of identities which axiomatizes right product quasigroups, and use this to find axiom systems for right product (left, right) loops; in fact, we can obtain each of the latter by adjoining just one appropriate axiom to the right product quasigroup axiom system. We derive other properties of right product quasigroups and loops, and conclude by show- ing that the axioms for right product quasigroups are independent. 1. Introduction In the semigroup literature (e.g., [1]), the most commonly used definition of right group is a semigroup (S; ·) which is right simple (i.e., has no proper right ideals) and left cancellative (i.e., xy = xz =) y = z). The structure of right groups is clarified by the following well-known representation theorem (see [1]): Theorem 1.1. A semigroup (S; ·) is a right group if and only if it is isomorphic to a direct product of a group and a right zero semigroup.
    [Show full text]
  • The Characteristics of Some Kinds of Special Quasirings *
    ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 1, No. 5, 2006, pp. 295-302 The Characteristics of Some Kinds of Special Quasirings * Ping Zhu1, Jinhui Pang 2, Xu-qing Tang3 1 School of Science, Southern Yangtze University, Wuxi, Jiangsu 214122, P. R. China + 2 School of Management & Economics, Beijing Institute Of Technology, Beijing, 100081, P. R. China 3 Key Laboratory of Intelligent Computing &Signal Processing of Ministry of Education, Anhui University, Hefei, 230039, P. R. China ( Received July 02, 2006, Accepted September 11, 2006 ) Abstract. By using quasi-group, we introduce some kinds of special quasi-rings and discuss their characteristics. According to the concept of monogenic semigroup we introduce definition of monogenic semiring and discuss the numbers and structures of monogenic semiring .Then we display their relations as following: Ø {integral domain }(∉ { strong biquasiring }) {}division ring Ø {}({int})strong biquasiring∉ egral domain Ø {}ring ØØØ{}biquasiring {}{} quasiring semiring Ø {}monogenic semiring Keywords: Semiring, Quasiring, Biquasiring, Strong Biquasiring, Monogenic Semiring AMS: Subject Classification (2000): 20M07, 20M10 1. Introduction A semiring[1] S = (S,+,•) is an algebra where both the additive reduct (S,+) and the multiplicative reduct (S,•) are semigroups and such that the following distributive laws hold: x( y + z) = xy + xz, (x + y)z = xz + yz . A semiring (,,)S + • is called a nilsemiring if there are additive idempotent 0 and for any a∈S ,there are n∈N , such that na = 0 . An ideal (prime ideal) of a semiring (S,+,•) is the ideal (prime ideal) of the (S,•). An ideal I of a semiring S is called a K-ideal[1], if ∀a,b ∈ S, a ∈ I and (a + b ∈ I or b + a ∈ I ) ⇒ b ∈ I .
    [Show full text]
  • A Guide to Self-Distributive Quasigroups, Or Latin Quandles
    A GUIDE TO SELF-DISTRIBUTIVE QUASIGROUPS, OR LATIN QUANDLES DAVID STANOVSKY´ Abstract. We present an overview of the theory of self-distributive quasigroups, both in the two- sided and one-sided cases, and relate the older results to the modern theory of quandles, to which self-distributive quasigroups are a special case. Most attention is paid to the representation results (loop isotopy, linear representation, homogeneous representation), as the main tool to investigate self-distributive quasigroups. 1. Introduction 1.1. The origins of self-distributivity. Self-distributivity is such a natural concept: given a binary operation on a set A, fix one parameter, say the left one, and consider the mappings ∗ La(x) = a x, called left translations. If all such mappings are endomorphisms of the algebraic structure (A,∗ ), the operation is called left self-distributive (the prefix self- is usually omitted). Equationally,∗ the property says a (x y) = (a x) (a y) ∗ ∗ ∗ ∗ ∗ for every a, x, y A, and we see that distributes over itself. Self-distributivity∈ was pinpointed already∗ in the late 19th century works of logicians Peirce and Schr¨oder [69, 76], and ever since, it keeps appearing in a natural way throughout mathematics, perhaps most notably in low dimensional topology (knot and braid invariants) [12, 15, 63], in the theory of symmetric spaces [57] and in set theory (Laver’s groupoids of elementary embeddings) [15]. Recently, Moskovich expressed an interesting statement on his blog [60] that while associativity caters to the classical world of space and time, distributivity is, perhaps, the setting for the emerging world of information.
    [Show full text]
  • Semilattice Sums of Algebras and Mal'tsev Products of Varieties
    Mathematics Publications Mathematics 5-20-2020 Semilattice sums of algebras and Mal’tsev products of varieties Clifford Bergman Iowa State University, [email protected] T. Penza Warsaw University of Technology A. B. Romanowska Warsaw University of Technology Follow this and additional works at: https://lib.dr.iastate.edu/math_pubs Part of the Algebra Commons The complete bibliographic information for this item can be found at https://lib.dr.iastate.edu/ math_pubs/215. For information on how to cite this item, please visit http://lib.dr.iastate.edu/ howtocite.html. This Article is brought to you for free and open access by the Mathematics at Iowa State University Digital Repository. It has been accepted for inclusion in Mathematics Publications by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Semilattice sums of algebras and Mal’tsev products of varieties Abstract The Mal’tsev product of two varieties of similar algebras is always a quasivariety. We consider when this quasivariety is a variety. The main result shows that if V is a strongly irregular variety with no nullary operations, and S is a variety, of the same type as V, equivalent to the variety of semilattices, then the Mal’tsev product V ◦ S is a variety. It consists precisely of semilattice sums of algebras in V. We derive an equational basis for the product from an equational basis for V. However, if V is a regular variety, then the Mal’tsev product may not be a variety. We discuss examples of various applications of the main result, and examine some detailed representations of algebras in V ◦ S.
    [Show full text]
  • Mathematica Balkanica ————————— Analysis of Some Quasigroup Transformations As Boolean Functions Aleksandra Mi
    Mathematica B a l k a n i c a ||||||||| New Series Vol. 26, 2012, Fasc. 3{4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference on Mathematics MICOM-2009 Two kind of attacks on cryptographic primitives - the linear and the differential crypt- analysis, have been occupied the attention of the cryptographic community since several years ago. Every cryptographic primitive can be examined as a vector valued Boolean function. The prop ratio tables and the correlation matrices are important tools for analyzing the resistance of any Boolean function to the linear and the differential cryptanalysis. There are several cryptographic primitives based on the so called quasigroup transformations, and in this paper we analyze these quasigroup transformations as Boolean functions. We examine correlation matrices, prop ratio tables and some other cryptographic properties. MSC 2010: 94A60, 20N05, 11T71. Key Words: vector valued Boolean function, prop ratio tables, correlation matrices, quasigroup transformations. 1. Introduction Most of the known constructions of cryptographic primitives use struc- tures from the associative algebras as groups, rings and fields. Two eminent specialists on quasigroups, J. D´enesand A. D. Keedwell [5], once proclaimed the advent of a new era in cryptology, consisting in the application of non- associative algebraic systems as quasigroups and neo-fields. In the past few years, cryptographic community have been introduced with several complete quasigroup based cryptographic primitives (complete in the sense of software and/or hardware implementations, security analysis and proofs and external cryptanalysis), as the binary additive stream cipher Edon80 [6], which is one of the few left unbroken eSTREAM finalists; two Round 1 candidate hash func- tions of NIST SHA-3 competition: Edon-R [7] and NaSHA [10]; etc.
    [Show full text]
  • The Quasigroup Block Cipher and Its Analysis Matthew .J Battey University of Nebraska at Omaha
    University of Nebraska at Omaha DigitalCommons@UNO Student Work 5-2014 The Quasigroup Block Cipher and its Analysis Matthew .J Battey University of Nebraska at Omaha Follow this and additional works at: https://digitalcommons.unomaha.edu/studentwork Part of the Computer Sciences Commons Recommended Citation Battey, Matthew J., "The Quasigroup Block Cipher and its Analysis" (2014). Student Work. 2892. https://digitalcommons.unomaha.edu/studentwork/2892 This Thesis is brought to you for free and open access by DigitalCommons@UNO. It has been accepted for inclusion in Student Work by an authorized administrator of DigitalCommons@UNO. For more information, please contact [email protected]. The Quasigroup Block Cipher and its Analysis A Thesis Presented to the Department of Computer Sience and the Faculty of the Graduate College University of Nebraska In partial satisfaction of the requirements for the degree of Masters of Science by Matthew J. Battey May, 2014 Supervisory Committee: Abhishek Parakh, Co-Chair Haifeng Guo, Co-Chair Kenneth Dick Qiuming Zhu UMI Number: 1554776 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI 1554776 Published by ProQuest LLC (2014). Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code ProQuest LLC. 789 East Eisenhower Parkway P.O.
    [Show full text]
  • Oriented Steiner Quasigroups
    Oriented Steiner quasigroups Izabella Stuhl Abstract We introduce the notion of an oriented Steiner quasigroup and de- velop elements of a relevant algebraic apparatus. The approach is based upon (modified) Schreier-type f-extensions for quasigroups (cf. earlier works [14, 11, 10]) achieved through oriented Steiner triple sys- tems. This is done in a fashion similar to in [13] where an analogous construction was established for loops. As a justification of this con- cept briefly discuss an application of oriented Steiner triple systems in cryptography using oriented Steiner quasigroups. 1 Introduction A Steiner triple system S is an incidence structure consisting of points and blocks such that every two distinct points are contained in precisely one block and any block has precisely three points. A finite Steiner triple system with n points exists if and only if n ≡ 1 or 3 (mod 6). A possible way to enrich Steiner triple systems is to introduce in each block a cyclic order. These objects occur in the literature as oriented Steiner triple systems (S, T ) (see [16]) or as Mendelsohn triple systems (see [8] Section 28, p. 388). Steiner triple systems play an important role in applications, particulary in cryptography, coding theory, statistics and computer science. Cf. [3], [6] (where a number of chapters are dedicated to this concept), and also [5] and the references therein. A particular example of an application is given in [15]. The results of the present paper develop an algebraic background that arXiv:1402.4644v2 [math.GR] 22 Apr 2014 can be useful, e.g., in the context of [2].
    [Show full text]
  • On Orders of Elements in Quasigroups
    BULETINUL ACADEMIEI DE S¸TIINT¸E A REPUBLICII MOLDOVA. MATEMATICA Number 2(45), 2004, Pages 49–54 ISSN 1024–7696 On orders of elements in quasigroups Victor Shcherbacov Abstract. We study the connection between the existence in a quasigroupof(m, n)- elements for some natural numbers m, n and properties of this quasigroup. The special attention is given for case of (m, n)-linear quasigroups and (m, n)-T-quasigroups. Mathematics subject classification: 20N05. Keywords and phrases: Quasigroup, medial quasigroup, T-quasigroup, order of an element of a quasigroup. 1 Introduction We shall use basic terms and concepts from books [1, 2, 11]. We recall that a binary groupoid (Q, A) with n-ary operation A such that in the equality A(x1,x2)= x3 knowledge of any two elements of x1,x2,x3 the uniquely specifies the remaining one is called a binary quasigroup [3]. It is possible to define a binary quasigroup also as follows. Definition 1. A binary groupoid (Q, ◦) is called a quasigroup if for any element (a, b) of the set Q2 there exist unique solutions x,y ∈ Q to the equations x ◦ a = b and a ◦ y = b [1]. An element f(b) of a quasigroup (Q, ·) is called a left local identity element of an element b ∈ Q, if f(b) · b = b. An element e(b) of a quasigroup (Q, ·) is called a right local identity element of an element b ∈ Q, if b · e(b)= b. The fact that an element e is a left (right) identity element of a quasigroup (Q, ·) means that e = f(x) for all x ∈ Q (respectively, e = e(x) for all x ∈ Q).
    [Show full text]
  • Elements of Quasigroup Theory and Some Its Applications in Code Theory and Cryptology
    Elements of quasigroup theory and some its applications in code theory and cryptology Victor Shcherbacov 1 1 Introduction 1.1 The role of definitions. This course is an extended form of lectures which author have given for graduate students of Charles University (Prague, Czech Republic) in autumn of year 2003. In this section we follow books [56, 59]. In mathematics one should strive to avoid ambiguity. A very important ingredient of mathematical creativity is the ability to formulate useful defi- nitions, ones that will lead to interesting results. Every definition is understood to be an if and only if type of statement, even though it is customary to suppress the only if. Thus one may define: ”A triangle is isosceles if it has two sides of equal length”, really meaning that a triangle is isosceles if and only if it has two sides of equal length. The basic importance of definitions to mathematics is also a structural weakness for the reason that not every concept used can be defined. 1.2 Sets. A set is well-defined collection of objects. We summarize briefly some of the things we shall simply assume about sets. 1. A set S is made up of elements, and if a is one of these elements, we shall denote this fact by a ∈ S. 2. There is exactly one set with no elements. It is the empty set and is denoted by ∅. 3. We may describe a set either by giving a characterizing property of the elements, such as ”the set of all members of the United State Senate”, or by listing the elements, for example {1, 3, 4}.
    [Show full text]
  • Abelian and Hamiltonian Groupoids
    Dedicated to Yury Evgen’evich Shishmaryov 510.8:512.57 ABELIAN AND HAMILTONIAN GROUPOIDS STEPANOVA A.A.1, TRIKASHNAYA N.V. Abstract. In the work we investigate some groupoids which are the Abelian alge- bras and the Hamiltonian algebras. An algebra is Abelian if for every polynomial op- eration and for all elements a, b, c,¯ d¯ the implication t(a, c¯)= t(a, d¯) → t(b, c¯)= t(b, d¯) holds; an algebra is Hamiltonian if every subalgebra is a block of some congruence on the algebra. R.V. Warne in 1994 described the structure of the Abelian semi- groups. In this work we describe the Abelian groupoids with identity, the Abelian finite quasigroups and the Abelian semigroups S such that abS = aS and Sba = Sa for all a,b ∈ S. We prove that a finite Abelian quasigroup is a Hamiltonian algebra. We characterize the Hamiltonian groupoids with identity and semigroups under the condition of Abelian of this algebras. 1. Introduction The Abelian and Hamiltonian properties for algebras were investigated in [1, 2, 3]. In this work we study the groupoids, which are Abelian algebras and Hamiltonian algebras. Let us remind some definitions. An algebra hA; ·i with binary operation · is called a groupoid. A groupoid hA; ·i is called a quasigroup if for any a, b ∈ A there exist uniquely determined elements x, y ∈ A satisfying x · a = b, a · x = b. A quasigroup hA; ·i with identity element 1 such that 1 · a = a · 1 = a for every element a ∈ A is called a loop. A groupoid with an operation satisfying the associative law is called a semigroup.
    [Show full text]