On cryptosystems based on polynomials and finite fields

12Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In many single-key, symmetric or conventional cryptosystems the elements of a finite field can be regarded as the characters of a plaintext and ciphertext alphabet. Some properties of polynomials or polynomial functions on finite fields can be used for constructing cryptosystems. This note demonstrates by way of examples that great care has to be taken in choosing polynomials for enciphering and deciphering. Often complex looking polynomial functions induce very simple permutations of the elements of a finite field and therefore are not suitable for the construction of cryptosystems. Also an indication is given of some further areas of research in algebraic cryptography.

Cite

CITATION STYLE

APA

Lidl, R. (1985). On cryptosystems based on polynomials and finite fields. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 209 LNCS, pp. 10–15). Springer Verlag. https://doi.org/10.1007/3-540-39757-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free