A Study of Non Commutative Algebraic Structures and Their Applications in Cryptography

Authors

  • Dr. Rupen Chatterjee Department of Mathematics, Nabagram Hiralal Paul College, Nabagram, Hooghly, West Bengal Pin:712246, India (Affiliated to Calcutta University)

DOI:

https://doi.org/10.31305/rrijm.2022.v07.i04.019

Keywords:

cryptography, non-commutative, modular arithmetic, finite fields, abelian groups

Abstract

Non commutative algebraic structures have gained increasing attention in modern cryptography due to their inherent structural complexity and resistance to classical algebraic attacks. Unlike commutative systems, non-commutative structures exhibit asymmetric operational behavior, which can be effectively exploited to construct cryptographic schemes with enhanced security properties. This paper presents a comprehensive theoretical study of non-commutative algebraic structures and examines their relevance and applicability in contemporary cryptographic systems. The study focuses on fundamental non commutative structures such as groups, rings, semigroups, and algebras, emphasizing their algebraic properties and operational characteristics that contribute to cryptographic strength. Particular attention is given to the role of non commutativity in key exchange protocols, encryption mechanisms, authentication schemes, and post quantum cryptography. The absence of commutativity introduces computational hardness assumptions that are difficult to reduce to classical number theoretic problems, thereby providing alternative security foundations. This research adopts a theoretical and analytical approach, synthesizing existing algebraic principles with cryptographic concepts to highlight how non commutative structures support secure communication frameworks. The paper also discusses the advantages, limitations, and potential vulnerabilities associated with non commutative cryptographic constructions. By bridging abstract algebra with applied cryptography, the study aims to contribute to the development of robust cryptographic models suitable for emerging security challenges.

References

Artin, M. (1991). Algebra. Prentice Hall, Englewood Cliffs.

Aschbacher, M. (2000). Finite Group Theory. Cambridge University Press.

Dummit, D. S., & Foote, R. M. (2004). Abstract Algebra (3rd ed.). Wiley.

Rotman, J. J. (2009). An Introduction to the Theory of Groups. Springer.

Lang, S. (2002). Algebra. Springer Verlag.

Herstein, I. N. (1975). Topics in Algebra (2nd ed.). Wiley Eastern.

Jacobson, N. (1974). Basic Algebra I. W. H. Freeman and Company.

Passman, D. S. (1977). The Algebraic Structure of Group Rings. Wiley Interscience.

Menezes, A. J., van Oorschot, P. C., & Vanstone, S. A. (1996). Handbook of Applied Cryptography. CRC Press.

Katz, J., & Lindell, Y. (2007). Introduction to Modern Cryptography. Chapman & Hall/CRC.

Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson Education.

Koblitz, N. (1994). A Course in Number Theory and Cryptography. Springer Verlag.

Shpilrain, V., & Zapata, G. (2006). Combinatorial group theory and cryptography. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 53–64.

Anshel, I., Anshel, M., & Goldfeld, D. (1999). An algebraic method for public-key cryptography. Mathematical Research Letters, 6, 287–291.

Myasnikov, A., Shpilrain, V., & Ushakov, A. (2011). Group-Based Cryptography. Birkhäuser.

Grigoriev, D., & Shpilrain, V. (2006). Authentication schemes from actions on graphs, groups, or monoids. Contemporary Mathematics, 418, 153–162.

Boneh, D., & Shoup, V. (2020). A Graduate Course in Applied Cryptography. Draft manuscript.

Bernstein, D. J., Buchmann, J., & Dahmen, E. (2009). Post-Quantum Cryptography. Springer.

Goldreich, O. (2001). Foundations of Cryptography, Volume I. Cambridge University Press.

Childs, L. N. (2009). A Concrete Introduction to Higher Algebra. Springer.

Downloads

Published

15-04-2022

How to Cite

Chatterjee, R. (2022). A Study of Non Commutative Algebraic Structures and Their Applications in Cryptography. RESEARCH REVIEW International Journal of Multidisciplinary, 7(4), 132–145. https://doi.org/10.31305/rrijm.2022.v07.i04.019