• Title/Summary/Keyword: Semidirect products

Search Result 2, Processing Time 0.016 seconds

A NOTE ON BILATERAL SEMIDIRECT PRODUCT DECOMPOSITIONS OF SOME MONOIDS OF ORDER-PRESERVING PARTIAL PERMUTATIONS

  • Fernandes, Vitor H.;Quinteiro, Teresa M.
    • Bulletin of the Korean Mathematical Society
    • /
    • v.53 no.2
    • /
    • pp.495-506
    • /
    • 2016
  • In this note we consider the monoid $\mathcal{PODI}_n$ of all monotone partial permutations on $\{1,{\ldots},n\}$ and its submonoids $\mathcal{DP}_n$, $\mathcal{POI}_n$ and $\mathcal{ODP}_n$ of all partial isometries, of all order-preserving partial permutations and of all order-preserving partial isometries, respectively. We prove that both the monoids $\mathcal{POI}_n$ and $\mathcal{ODP}_n$ are quotients of bilateral semidirect products of two of their remarkable submonoids, namely of extensive and of co-extensive transformations. Moreover, we show that $\mathcal{PODI}_n$ is a quotient of a semidirect product of $\mathcal{POI}_n$ and the group $\mathcal{C}_2$ of order two and, analogously, $\mathcal{DP}_n$ is a quotient of a semidirect product of $\mathcal{ODP}_n$ and $\mathcal{C}_2$.

Cryptographic Protocols using Semidirect Products of Finite Groups

  • Lanel, G.H.J.;Jinasena, T.M.K.K.;Welihinda, B.A.K.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.17-27
    • /
    • 2021
  • Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to non-abelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.