TY - GEN AU - González Vasco,María Isabel TI - Interactions between Group Theory, Symmetry and Cryptology SN - books978-3-03928-803-8 PY - 2020/// PB - MDPI - Multidisciplinary Digital Publishing Institute KW - NP-Completeness KW - protocol compiler KW - post-quantum cryptography KW - Reed–Solomon codes KW - key equation KW - euclidean algorithm KW - permutation group KW - t-modified self-shrinking generator KW - ideal cipher model KW - algorithms in groups KW - lightweight cryptography KW - generalized self-shrinking generator KW - numerical semigroup KW - pseudo-random number generator KW - symmetry KW - pseudorandom permutation KW - Berlekamp–Massey algorithm KW - semigroup ideal KW - algebraic-geometry code KW - non-commutative cryptography KW - provable security KW - Engel words KW - block cipher KW - cryptography KW - beyond birthday bound KW - Weierstrass semigroup KW - group theory KW - braid groups KW - statistical randomness tests KW - group-based cryptography KW - alternating group KW - WalnutDSA KW - Sugiyama et al. algorithm KW - cryptanalysis KW - digital signatures KW - one-way functions KW - key agreement protocol KW - error-correcting code KW - group key establishment N1 - Open Access N2 - Cryptography lies at the heart of most technologies deployed today for secure communications. At the same time, mathematics lies at the heart of cryptography, as cryptographic constructions are based on algebraic scenarios ruled by group or number theoretical laws. Understanding the involved algebraic structures is, thus, essential to design robust cryptographic schemes. This Special Issue is concerned with the interplay between group theory, symmetry and cryptography. The book highlights four exciting areas of research in which these fields intertwine: post-quantum cryptography, coding theory, computational group theory and symmetric cryptography. The articles presented demonstrate the relevance of rigorously analyzing the computational hardness of the mathematical problems used as a base for cryptographic constructions. For instance, decoding problems related to algebraic codes and rewriting problems in non-abelian groups are explored with cryptographic applications in mind. New results on the algebraic properties or symmetric cryptographic tools are also presented, moving ahead in the understanding of their security properties. In addition, post-quantum constructions for digital signatures and key exchange are explored in this Special Issue, exemplifying how (and how not) group theory may be used for developing robust cryptographic tools to withstand quantum attacks UR - https://mdpi.com/books/pdfview/book/2232 UR - https://directory.doabooks.org/handle/20.500.12854/50457 ER -