Cryptographic protocols based on DLP are Die-Hellman key exchange [3],El-Gamal cryptosystem [4], Digital Signature Algorithm (DSA), El-Gamal DigitalSignature scheme [4].Die-Hellman Key Exchange Protocol [3] based on exponentation in cyclicgroup allows two users Alice and Bob who wish to communicate over insecure(public) channel to create a common key. In it a cyclic group G and a generator gof G where both g and its order d are chosen and made public.Alice chooses an integer a (between 2 and d − 1) and transmits g a to Bob. Bobchooses an integer b (between 2 and d − 1) and transmits g b to Alice. Then Alicecomputes k a = (g b ) a ,while Bob computes k b = (g a ) b .The shared common key isthus k = k a = k b ∈ G.The Die-Hellman Problem(DHP) is the problem of computing the value g abknowing g ∈ G and having observed both g a and g b .Clearly, if DLP is easy then so is DHP and thus the Die-Hellman key exchangeprotocol. So, as a minimum requirement, we are interested in nding dicult instancesof DLP. A lot of eorts were undertaken to nd groups were the DLP willbe dicult to compute.In the literature many groups have been proposed for computing the discretelogarithms. In practice have been implemented the multiplicative group (Z/nZ) ∗of integers modulo n, the multiplicative group F ∗ of nonzero elements inside a niteeld F and subgroups of these groups (see [8]), the group of points on an elipticcurve or Jacobians of hypereliptic curves (see [5]). Ko et al. proposed protocolanalogue to the Die-Hellman key exchange using non abelian group (see [7]). Wesuggest [2] as a guide to cryptography based on group theory.In recent time the discrete logarithm problem over a group is seen as a specialinstance of an action by a semigroup (see [1], [9], [11]).In this paper we show how endomorphism semirings can be used to build interestingabelian semigroup actions.A concrete practical semigroup action built fromendomorphism semirings of a nite semilattice of a special type is presented.2. PRELIMINARIES2.1 Basic denitionsLet G be an abelian semigroup (a set with an associative and commutativemultiplication "·") i.e. a monoid and S be a nite set. A left action of G on S is amap ϕ : G × S −→ S, satisfying ϕ(g · h, s) = ϕ(g, ϕ(h, s)). We will denote ϕ(g, s)by gs . Right actions are similarly dened.2.2 Extended Die-Hellman Key Exchange Protocol in (G, S, ϕ):1. Alice and Bob publicly agree on some element s ∈ S.30
2. Alice chooses a ∈ G and transmits as to Bob.3. Bob chooses b ∈ G and transmits bs to Alice.4. Alice computes k a = a(bs) while Bob computes k b = b(as).The shared common key is thus k = k a = a(bs) = (a·b)s = (b·a)s = b(as) = k b .It is obvious that one can build a cryptosystem based on semigroup action if it isa hard problem.2.3 Semigroup Action Problem (SAP)Given a semigroup G acting on a nite set S and elements x ∈ S and y ∈ Gx,nd g ∈ G such that y = gx.The Die-Hellman key exchange is a special case of the Extended Die-Hellmankey exchange when (G, ·) be a semigroup of integers (Z, ·), S be a cyclic groupH =< s > where the discrete logarithm is believed to be dicult.The action isϕ : Z × H −→ H ,where ϕ(n, s) = s n .The identity s ab = (s a ) b says that ϕ is a commutative G-action.The security of Protocol 2.2 is equivalent to solve SAP.In 2010 was constructed new public key cryptosystem (see [12]) which is developedin [13]:2.4 Extended Die-Hellman Key Exchange Protocol in (G,S,ϕ,ψ)Let G be a monoid, S be a nite set and A and B be submonoids of G.Letϕ : A × S −→ S be an action of A on S and ψ : B × S −→ S be an action of Bon S andϕ(a, ψ(b, s))) = ψ(b, ϕ(a, s))for any elements a ∈ A,b ∈ B and s ∈ S.1. Alice and Bob publicly agree on some element s ∈ S.2. Alice chooses submonoid A of G and an element a ∈ A.Then she transmitsas to Bob (her private key is (A, a) and her public key is as ).3. Bob chooses submonoid B of G and an element b ∈ B.Then he transmits bsto Alice (his private key is (B, b) and his public key is bs ).4. Alice computes k A = ϕ(a, ψ(b, s))) while Bob computes k b = ψ(b, ϕ(a, s)).The shared common key is thusk = k A = ϕ(a, ψ(b, s)) = ψ(b, ϕ(a, s)) = k b .When A = B = G and ϕ = ψ we reach the Protocol 2.2.The given key exchange protocol is related to the following hard problem:31
- Page 1 and 2: ISSN 1311-0829ГОДИШНИК НА
- Page 3 and 4: Годишник на Технич
- Page 5 and 6: Годишник на Технич
- Page 7: Годишник на Технич
- Page 10 and 11: • If a neutral element 1 of the s
- Page 12 and 13: Proof. (i) Since for arbitrary ≀
- Page 14 and 15: )is the endomorphism ≀ 0, . . . ,
- Page 16 and 17: ∣∣E (k)C n∣ ∣∣ =Propositi
- Page 18 and 19: For k = 0 and s = 1 from the last p
- Page 20 and 21: Facts concerning semilattices can b
- Page 22 and 23: described by the following join-tab
- Page 24 and 25: Finally we observe{aj , if i = k(f
- Page 26 and 27: Let us consider the endomorphisms f
- Page 28 and 29: Proposition 3.8 For any n ≥ 2 in
- Page 32 and 33: 2.5 Bi-Semigroup Action Problem (BS
- Page 35 and 36: Theorem 4.5 [14]. In the center of
- Page 37 and 38: The only way we know for an attacke
- Page 39 and 40: Годишник на Технич
- Page 41 and 42: The exact definitions of points and
- Page 43 and 44: FirstIterationSecondIterationx 0 0
- Page 45 and 46: * x4. Order of approximationBecause
- Page 47 and 48: Годишник на Технич
- Page 49 and 50: генератори, присъе
- Page 55 and 56: № РежимТабл.4.1 Бала
- Page 57 and 58: Годишник на Технич
- Page 59 and 60: Табл.11 2 3 4 5 6 7Загуби
- Page 61 and 62: оцени разхода на ак
- Page 63 and 64: сформатора се нала
- Page 65 and 66: -да допуска претова
- Page 67 and 68: Годишник на Технич
- Page 69 and 70: -големи трудности п
- Page 71 and 72: трансформаторът се
- Page 73 and 74: При известно фазов
- Page 75 and 76: KU BHOCHR (12)w w wЗа да се
- Page 77 and 78: Годишник на Технич
- Page 79 and 80: aided impregnation of wood and wood
- Page 81 and 82:
different as a result of the differ
- Page 83 and 84:
Table 2. Carbon peak C s1 component
- Page 85 and 86:
Годишник на Технич
- Page 87 and 88:
esults indicating that the reductio
- Page 89 and 90:
Change of Mass M, %100-10-20-30-40
- Page 91 and 92:
However, the correlation between re
- Page 93 and 94:
Electrical Apparatus and Technologi
- Page 95 and 96:
Годишник на Технич
- Page 97 and 98:
- преходът към стри
- Page 99 and 100:
или магнитно изоли
- Page 101 and 102:
от лист електротех
- Page 103 and 104:
Фиг. 6. Изменение на
- Page 105 and 106:
Годишник на Технич
- Page 107 and 108:
Fig.1 Block structure of proposed o
- Page 109 and 110:
Fig.4. Initial and best shape of po
- Page 111 and 112:
Fig.8 Calculated initial cogging to
- Page 113 and 114:
Годишник на Технич
- Page 115 and 116:
Octave/Lua interface is a Matlab to
- Page 117 and 118:
pends on the results of the thermal
- Page 119 and 120:
4. ResultsAs it has been mentioned
- Page 121 and 122:
A DC electromagnetic actuators with
- Page 123 and 124:
Годишник на Технич
- Page 125 and 126:
ращ се наблизо пров
- Page 127 and 128:
Фиг. 4. Зависимост н
- Page 129 and 130:
че максималната то
- Page 131 and 132:
3.7. Ефект близост в
- Page 133 and 134:
Годишник на Технич
- Page 135 and 136:
11 c x6T 2 c3c4c5ec p c1c , (2)
- Page 137 and 138:
От кривата на макси
- Page 139 and 140:
109.598.5Wind speed, m/s87.576.565.
- Page 141 and 142:
6. ЗаключениеВ стат
- Page 143 and 144:
Годишник на Технич
- Page 145 and 146:
Фиг.1. Заместваща сх
- Page 147 and 148:
където t е времето м
- Page 149 and 150:
Бяха проведени и ек
- Page 151 and 152:
Представени са рез
- Page 153 and 154:
Годишник на Технич
- Page 155 and 156:
Фиг.3. Архитектури н
- Page 157 and 158:
P SC_refP batP WP HGP storP bat_ref
- Page 159 and 160:
1500Фиг.9. Модел в Matlab/
- Page 161 and 162:
Isc, AVsc, V50403020100-10-20-30-40
- Page 163 and 164:
Годишник на Технич
- Page 165 and 166:
шаване на температ
- Page 167 and 168:
При променлив темп
- Page 169 and 170:
Годишник на Технич
- Page 171 and 172:
2. Примерни компютъ
- Page 173 and 174:
3.3. Изследване на фо
- Page 175 and 176:
алгебра. За целта с
- Page 177 and 178:
3.13. Изчисляване на
- Page 179 and 180:
Годишник на Технич
- Page 181 and 182:
Количеството на от
- Page 183 and 184:
(CaSO 4 .2H 2 O) (фиг. 3). То
- Page 185 and 186:
работят всички инс
- Page 187 and 188:
(НДНТ), което за Бъл
- Page 189 and 190:
Годишник на Технич
- Page 191 and 192:
Communications software and hardwar
- Page 193 and 194:
puter is running virtualization sof
- Page 195 and 196:
execution to the dispatcher applica
- Page 197 and 198:
Годишник на Технич
- Page 199 and 200:
Тунелирането скрив
- Page 201 and 202:
управление на ресу
- Page 203 and 204:
Фиг.6: Симулационен
- Page 205 and 206:
tunnel source 1.1.1.1tunnel destina
- Page 207 and 208:
Годишник на Технич
- Page 209 and 210:
При отворена вериг
- Page 211 and 212:
Таблица 3Задвижващ
- Page 213 and 214:
Фигура 3.При съотно
- Page 215 and 216:
Годишник на Технич
- Page 217 and 218:
Необходимо е така д
- Page 219 and 220:
yследователно:( k )UOsi
- Page 221 and 222:
Годишник на Технич
- Page 223 and 224:
Laskin and Wang presented a detaile
- Page 225 and 226:
Figure 2: Temperature dependence of
- Page 227 and 228:
An additional analysis obtained at