Paper 2024/715
A New Cryptographic Algorithm
Abstract
The advent of quantum computing technology will compromise many of the current cryptographic algorithms, especially public-key cryptography, which is widely used to protect digital information. Most algorithms on which we depend are used worldwide in components of many different communications, processing, and storage systems. Once access to practical quantum computers becomes available, all public-key algorithms and associated protocols will be vulnerable to criminals, competitors, and other adversaries. It is critical to begin planning for the replacement of hardware, software, and services that use public-key algorithms now so that information is protected from future attacks.” [1]. For this purpose, we have developed a new algorithm that contributes to deal with the aforementioned problem. Instead to use a classical scheme of encoding / decoding methods (keys, prime numbers, etc.), our algorithm is rather based on a combination of functions. Because the cardinality of the set of functions is infinite, it would be impossible for a third party (e.g. a hacker) to decode the secret information transmitted by the sender (Bob) to the receiver (Alice).
Metadata
- Available format(s)
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- Post quantum computingCryptographyFunctions combination
- Contact author(s)
- ali mahdoum @ gmail com
- History
- 2024-05-10: approved
- 2024-05-09: received
- See all versions
- Short URL
- https://ia.cr/2024/715
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/715, author = {Ali Mahdoum}, title = {A New Cryptographic Algorithm}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/715}, year = {2024}, url = {https://eprint.iacr.org/2024/715} }