13 research outputs found

    Construction of Key Echange Protocol over Max-Plus Algebra to Encrypt and Decrypt Arabic Documents

    Get PDF
    In this paper, we consider the operation of matrix in Max-plus Algebra to construct a key public to encrypt and decrypt arabic document. Matrix operation in max-plus algebra is slight different with matrix operation in classical. In this paper, we also use a modular 37 to translate it into arabic text (arabic letter with number and special character)

    Construction of Key Echange Protocol over Max-Plus Algebra to Encrypt and Decrypt Arabic Documents

    Get PDF
    In this paper, we consider the operation of matrix in Max-plus Algebra to construct a key public to encrypt and decrypt arabic document. Matrix operation in max-plus algebra is slight different with matrix operation in classical. In this paper, we also use a modular 37 to translate it into arabic text (arabic letter with number and special character)

    Public key cryptography based on tropical algebra

    Get PDF
    We analyse some public keys cryptography in the classical algebra and tropical algebra. Currently one of the most secure system that is used is public key cryptography, which is based on discrete logarithm problem. The Dilfie-Helman public key and Stickel’s key ex-change protocol are the examples of the application of discrete logarithm problem in public key cryptography. This thesis will examine the possibilities of public key cryptography implemented within tropical mathematics. A tropical version of Stickel’s key exchange protocol was suggested by Grigoriev and Sphilrain We suggest some modifications of this scheme use commuting matrices in tropical algebra and discuss some possibilities of at- tacks on them. We also generalise Kotov and Ushakov’s attack and implement in our new protocols. In 2019, Grigoriev and Sphilrain [14] generated two new public key exchange protocols based on semidirect product. In this thesis we use some properties of CSR and ultimate periodicity in tropical algebra to construct an efficient attack on one of the protocols suggested in that pape

    On the tropical discrete logarithm problem and security of a protocol based on tropical semidirect product

    Full text link
    Tropical linear algebra has been recently put forward by Grigoriev and Shpilrain as a promising platform for implementation of protocols of Diffie-Hellman and Stickel type. Based on the CSR expansion of tropical matrix powers, we suggest a simple algorithm for the following tropical discrete logarithm problem: "Given that A=V⊗F⊗tA=V\otimes F^{\otimes t} for a unique tt and matrices AA, VV, FF of appropriate dimensions, find this tt." We then use this algorithm to suggest a simple attack on a protocol based on the tropical semidirect product. The algorithm and the attack are guaranteed to work in some important special cases and are shown to be efficient in our numerical experiments.Comment: 32 pages, 1 figur

    Modifying the tropical version of Stickel's key exchange protocol

    Get PDF

    The Comparison Results of Logit and Probit Regression on Factors of Woman Criminal

    Get PDF
    Logit and probit regression are statistical methods that have the same is to determine predictor variables affect the categorical response variable. From relevant studies, they have advantages and disadvantages on certain cases. Therefore, the logit and probit regression will be applied on factors of woman criminal considering women crime rate in Central Java is still relatively high. This study aims to compare the result of the two regression so that the best regression model is obtained to explain factors that influence woman criminal. The data type used is primary data obtained using a questionnaire and validated by non-empirical validation. The sample was taken using a quota sampling technique. The result showed that probit regression is the best model with the factors that influence woman criminal are the age of 17-25 years, 26-35 years, junior high school education level, married and ever married marital status

    Algorithm Hill Cipher for Securing Arabic Text Documents

    Get PDF
    This research is an application of Hill Cipher cryptographic techniques in the process of encoding messages in the form of Arabic text. Hill Cipher is a classic cryptographic algorithm that uses modulo matrix and arithmetic in its application. The Arabic text used in the Hill Cipher cryptographic technique includes hijaiyyah letters ا, ب, , ي, أ, إ, ؤ, ئ, ى, ة, space , ., ،, ؟, !, and Arabic numbers 0, 1, 9, so the modulo used is                    . This study discusses the steps in encrypting messages with examples of their application in securing Arabic text documents

    The Tropical Version of ElGamal Encryption

    Get PDF
    In this paper, we consider the new version of tropical cryptography protocol, i.e the tropical version of ElGamal encryption. We follow the ideas and modify the classical El Gamal encryption using tropical matrices and matrix power in tropical algebra. Then we also provide a toy example for the reader’s understanding

    The tropical version of El Gamal Encryption

    Get PDF
    In this paper, we consider the new version of tropical cryptography protocol, i.e the tropical version of El Gamal encryption.  We follow the ideas and modify the clasical El Gamal encryption using tropical matrices and matrix power in tropical algebra. Then we also provide a toy example for the reader’s understanding.

    Komutatif Matriks ordo 2×2 Atas Aljabar Max-Plus

    No full text
    Pada aljabar klasik, tidak semua matriks saling komutatif, begitu juga di aljabar max-plus. Pada artikel ini kita akan membahas tentang komutatif matriks ordo  atas aljabar max-plus. Selanjutkan kita akan mengkaji matriks komutatif dengan dimensi dalam aljabar maxplus terdiri atas beberapa kelas diantaranya matriks normal, matriks circulant dan generalisasi matriks Kleene star
    corecore