Votre choix sur les cookies : Nous utilisons des cookies pour assurer le bon fonctionnement de notre site ainsi que pour améliorer l'expérience publicitaire. Indiquez-nous votre choix d'utilisation des cookies ci-dessous.
The purpose of this paper is to present some encryption methods that have the following characteristics: to be symmetric ciphers,to be based on mathematical results that are part of algebra of cyclic sub-groups of symmetric groups, to be encryption processes using disposable keys : the secret encryption key is changed for each encryption , and the public information which make the recipient able to decrypt with the new key is...
The purpose of this paper is to present some encryption methods that have the following characteristics: to be symmetric ciphers,to be based on mathematical results that are part of algebra of cyclic sub-groups of symmetric groups, to be encryption processes using disposable keys : the secret encryption key is changed for each encryption , and the public information which make the recipient able to decrypt with the new key is sent with the cryptogram.These symmetric cryptographic methods will be defined purely mathematically . No example will be given of a computer program to implement the computational functions defined mathematically, nor of a study to determine which types of programming language would be most appropriate for these implementations . There will also be no research into which areas or situations these cryptographic methods could be used.