Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Gallaudet University

2019

Information security

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

Implementation Of Group Based Cryptosystems In Information Security, Bailey J. Moers May 2019

Implementation Of Group Based Cryptosystems In Information Security, Bailey J. Moers

Undergraduate University Honors Capstones

This capstone will focus on the implementation of cryptography in information security. The implementation can be achieved by studying different cryptosystems that will be secured using group based mathematics. Group based cryptosystems are preferable because research shows that group based cryptosystems are computationally infeasible. Understanding group based mathematics and its implementation in cryptography will allow us to better study the NTRU (Nth Truncated Ring Unit) cryptosystem with previous knowledge of group based cryptosystems. Although this cryptosystem is still very new, two sections of NTRU cryptosystem will be implemented in information security. The selected sections are: Multiplication of Polynomials modulo p …