Paper 2024/715

A New Cryptographic Algorithm

Ali Mahdoum, Centre de Développement des Technologies Avancées
Abstract

The advent of quantum computing technology will compromise many of the current cryptographic algorithms, especially public-key cryptography, which is widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Once access to practical quantum computers becomes available, all public-key algorithms and associated protocols will be vulnerable to criminals, competitors, and other adversaries. It is critical to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that information is protected from future attacks.” [1]. For this purpose, we have developed a new algorithm that contributes to deal with the aforementioned problem. Instead to use a classical scheme of encoding / decoding methods (keys, prime numbers, etc.), our algorithm is rather based on a combination of functions. Because the cardinality of the set of functions is infinite, it would be impossible for a third party (e.g. a hacker) to decode the secret information transmitted by the sender (Bob) to the receiver (Alice).

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint.
Keywords
Post quantum computingCryptographyFunctions combination
Contact author(s)
ali mahdoum @ gmail com
History
2024-05-10: approved
2024-05-09: received
See all versions
Short URL
https://ia.cr/2024/715
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/715,
      author = {Ali Mahdoum},
      title = {A New Cryptographic Algorithm},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/715},
      year = {2024},
      url = {https://eprint.iacr.org/2024/715}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.