13 research outputs found
Construction of Key Echange Protocol over Max-Plus Algebra to Encrypt and Decrypt Arabic Documents
In this paper, we consider the operation of matrix in Max-plus Algebra to construct a key public to encrypt and decrypt arabic document. Matrix operation in max-plus algebra is slight different with matrix operation in classical. In this paper, we also use a modular 37 to translate it into arabic text (arabic letter with number and special character)
Construction of Key Echange Protocol over Max-Plus Algebra to Encrypt and Decrypt Arabic Documents
In this paper, we consider the operation of matrix in Max-plus Algebra to construct a key public to encrypt and decrypt arabic document. Matrix operation in max-plus algebra is slight different with matrix operation in classical. In this paper, we also use a modular 37 to translate it into arabic text (arabic letter with number and special character)
Public key cryptography based on tropical algebra
We analyse some public keys cryptography in the classical algebra and tropical algebra. Currently one of the most secure system that is used is public key cryptography, which is based on discrete logarithm problem. The Dilfie-Helman public key and Stickel’s key ex-change protocol are the examples of the application of discrete logarithm problem in public key cryptography. This thesis will examine the possibilities of public key cryptography implemented within tropical mathematics. A tropical version of Stickel’s key exchange protocol was suggested by Grigoriev and Sphilrain We suggest some modifications of this scheme use commuting matrices in tropical algebra and discuss some possibilities of at- tacks on them. We also generalise Kotov and Ushakov’s attack and implement in our new protocols. In 2019, Grigoriev and Sphilrain [14] generated two new public key exchange protocols based on semidirect product. In this thesis we use some properties of CSR and ultimate periodicity in tropical algebra to construct an efficient attack on one of the protocols suggested in that pape
On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product
Tropical linear algebra has been recently put forward by Grigoriev and
Shpilrain as a promising platform for implementation of protocols of
Diffie-Hellman and Stickel type. Based on the CSR expansion of tropical matrix
powers, we suggest a simple algorithm for the following tropical discrete
logarithm problem: "Given that for a unique and
matrices , , of appropriate dimensions, find this ." We then use
this algorithm to suggest a simple attack on a protocol based on the tropical
semidirect product. The algorithm and the attack are guaranteed to work in some
important special cases and are shown to be efficient in our numerical
experiments.Comment: 32 pages, 1 figur
The Comparison Results of Logit and Probit Regression on Factors of Woman Criminal
Logit and probit regression are statistical methods that have the same is to determine predictor variables affect the categorical response variable. From relevant studies, they have advantages and disadvantages on certain cases. Therefore, the logit and probit regression will be applied on factors of woman criminal considering women crime rate in Central Java is still relatively high. This study aims to compare the result of the two regression so that the best regression model is obtained to explain factors that influence woman criminal. The data type used is primary data obtained using a questionnaire and validated by non-empirical validation. The sample was taken using a quota sampling technique. The result showed that probit regression is the best model with the factors that influence woman criminal are the age of 17-25 years, 26-35 years, junior high school education level, married and ever married marital status
Algorithm Hill Cipher for Securing Arabic Text Documents
This research is an application of Hill Cipher cryptographic techniques in the process of encoding messages in the form of Arabic text. Hill Cipher is a classic cryptographic algorithm that uses modulo matrix and arithmetic in its application. The Arabic text used in the Hill Cipher cryptographic technique includes hijaiyyah letters ا, ب, , ي, أ, إ, ؤ, ئ, ى, ة, space , ., ،, ؟, !, and Arabic numbers 0, 1, 9, so the modulo used is                    . This study discusses the steps in encrypting messages with examples of their application in securing Arabic text documents
The Tropical Version of ElGamal Encryption
In this paper, we consider the new version of tropical cryptography protocol, i.e the
tropical version of ElGamal encryption. We follow the ideas and modify the classical El
Gamal encryption using tropical matrices and matrix power in tropical algebra. Then
we also provide a toy example for the reader’s understanding
The tropical version of El Gamal Encryption
In this paper, we consider the new version of tropical cryptography protocol, i.e the tropical version of El Gamal encryption. We follow the ideas and modify the clasical El Gamal encryption using tropical matrices and matrix power in tropical algebra. Then we also provide a toy example for the reader’s understanding.
Komutatif Matriks ordo 2×2 Atas Aljabar Max-Plus
Pada aljabar klasik, tidak semua matriks saling komutatif, begitu juga di aljabar max-plus. Pada artikel ini kita akan membahas tentang komutatif matriks ordo atas aljabar max-plus. Selanjutkan kita akan mengkaji matriks komutatif dengan dimensi dalam aljabar maxplus terdiri atas beberapa kelas diantaranya matriks normal, matriks circulant dan generalisasi matriks Kleene star