Finite and infinite field cryptography analysis and applications

Most of the currently used cryptosystems are defined over finite fields and use modular arithmetic. Their security is often based on the difficulty of solving certain number theoretic problems. In recent years, a large amount of work for introducing of systems defined on infinite field in the desig...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohammed G. Al-Saidi, Nadia, Md. Said, Mohamad Rushdan, Mohammed, Arkan J.
Format: Conference or Workshop Item
Language:English
Published: 2012
Online Access:http://psasir.upm.edu.my/id/eprint/39922/1/39922.pdf
http://psasir.upm.edu.my/id/eprint/39922/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.upm.eprints.39922
record_format eprints
spelling my.upm.eprints.399222015-08-20T06:35:39Z http://psasir.upm.edu.my/id/eprint/39922/ Finite and infinite field cryptography analysis and applications Mohammed G. Al-Saidi, Nadia Md. Said, Mohamad Rushdan Mohammed, Arkan J. Most of the currently used cryptosystems are defined over finite fields and use modular arithmetic. Their security is often based on the difficulty of solving certain number theoretic problems. In recent years, a large amount of work for introducing of systems defined on infinite field in the design of new cryptosystems has been published. Many studies have been done by introducing of chaotic and fractal functions into the design of symmetric and asymmetric encryption scheme. This paper aims to discuss the advantages and drawbacks of using these new types of mathematics methods behind computer and network security that emerge as a result of integrating between communication and information sciences. In this paper the analysis and the comparison studies between these two disciplines is discussed in terms of their efficiency and security, to identify a common framework for the guidelines that address main issues for implementation and security analysis. Conclusions on their performance are inferred. 2012 Conference or Workshop Item NonPeerReviewed application/pdf en http://psasir.upm.edu.my/id/eprint/39922/1/39922.pdf Mohammed G. Al-Saidi, Nadia and Md. Said, Mohamad Rushdan and Mohammed, Arkan J. (2012) Finite and infinite field cryptography analysis and applications. In: International Conference on Applied Mathematics and Pharmaceutical Sciences (ICAMPS'2012), 7-8 Jan. 2012, Dubai. (pp. 587-591).
institution Universiti Putra Malaysia
building UPM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Putra Malaysia
content_source UPM Institutional Repository
url_provider http://psasir.upm.edu.my/
language English
description Most of the currently used cryptosystems are defined over finite fields and use modular arithmetic. Their security is often based on the difficulty of solving certain number theoretic problems. In recent years, a large amount of work for introducing of systems defined on infinite field in the design of new cryptosystems has been published. Many studies have been done by introducing of chaotic and fractal functions into the design of symmetric and asymmetric encryption scheme. This paper aims to discuss the advantages and drawbacks of using these new types of mathematics methods behind computer and network security that emerge as a result of integrating between communication and information sciences. In this paper the analysis and the comparison studies between these two disciplines is discussed in terms of their efficiency and security, to identify a common framework for the guidelines that address main issues for implementation and security analysis. Conclusions on their performance are inferred.
format Conference or Workshop Item
author Mohammed G. Al-Saidi, Nadia
Md. Said, Mohamad Rushdan
Mohammed, Arkan J.
spellingShingle Mohammed G. Al-Saidi, Nadia
Md. Said, Mohamad Rushdan
Mohammed, Arkan J.
Finite and infinite field cryptography analysis and applications
author_facet Mohammed G. Al-Saidi, Nadia
Md. Said, Mohamad Rushdan
Mohammed, Arkan J.
author_sort Mohammed G. Al-Saidi, Nadia
title Finite and infinite field cryptography analysis and applications
title_short Finite and infinite field cryptography analysis and applications
title_full Finite and infinite field cryptography analysis and applications
title_fullStr Finite and infinite field cryptography analysis and applications
title_full_unstemmed Finite and infinite field cryptography analysis and applications
title_sort finite and infinite field cryptography analysis and applications
publishDate 2012
url http://psasir.upm.edu.my/id/eprint/39922/1/39922.pdf
http://psasir.upm.edu.my/id/eprint/39922/
_version_ 1643832564174028800
score 13.214268