SlideShare a Scribd company logo
1 of 19
Download to read offline
bibliography
Combinatorial conditions for secret sharing
for Public Key Cryptography
by
Dr. N. Chandramowliswaran
Professor
Applied Sciences, NCU, Gurgaon
FEB. 27, 2016
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 1 / 19
bibliography
Latin Squares
Definition 1
Let n be a given positive integer and S = {s1, s2, . . . , sn} be a given set
of n distinct elements.
A Latin square of order n based on S is an n × n array in which every
element of S occurs exactly once in each row and exactly once in each
column.
Thus each of the rows and columns of a Latin square is a permutation
of S.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 2 / 19
bibliography
Let G be a finite group of n elements
Suppose f : G × G → G such that f(gi, gj) = gi ∗ gj ∈ G
For a fixed i, gi ∗ gj is a permutation on G for all j varies from 1 to n
Similarly, for a fixed j, gj ∗ gi is a permutation on G for all i varies
from 1 to n
such a function f is called a Latin function defined on G × G to G
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 3 / 19
bibliography
Let G = {g1, g2, . . . , gi, . . . , gj, . . . , gn}
Assume g1 = e, the identity element of G
Define an n × n matrix A by A = [aij] = [gi ∗ gj]
A is a Latin square of order n based on G
the i-th row of
A = {gi ∗ g1, gi ∗ g2, . . . , gi ∗ gi, . . . , gi ∗ gj, . . . , gi ∗ gn} and
the j-th column of
A = {g1 ∗ gj, g2 ∗ gj, . . . , gi ∗ gj, . . . , gj ∗ gj, . . . , gn ∗ gj}
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 4 / 19
bibliography
Theorem 1:
Let G be a finite group of order |G|
i.e., G = {g1, g2, . . . , gi, . . . , gj, . . . , g|G|}.
Let m and n be any two positive integers such that
(m, |G|) = (n, |G|) = 1.
Define |G| × |G| matrix A as A = [gm
i .gn
j ]; i, j ∈ {1, 2, 3, , |G|}.
Then A is a Latin square of order |G|.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 5 / 19
bibliography
Theorem 2:
Let a and b be any two fixed elements of a finite group G.
Define A = [(a ∗ gi) ∗ (gj ∗ b)], B = [(a ∗ gi) ∗ (b ∗ gj)],
C = [(gi ∗ a) ∗ (gj ∗ b)] and D = [(gi ∗ a) ∗ (b ∗ gj)].
Then A, B, C and D are all Latin squares of order |G|.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 6 / 19
bibliography
Theorem 3:
Let T1, T2 be any two automorphisms of a finite group of G.
Define |G| × |G| matrix A as A = [T1(gi) ∗ T2(gj)].
Then A is a Latin square of order |G|.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 7 / 19
bibliography
Let n be any positive integer
Zn = {0, 1, . . . , n − 1}, the set of integers modulo n
+n and ×n is the addition and multiplication (mod n) defined on
Zn
Define Z∗
n = Zn − {0} with a lies in Z∗
n if and only if (a, n) = 1
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 8 / 19
bibliography
select a, b lies in Z∗
n with [(a, n) = (b, n) = 1]
select r and s lies in Zn
Define a bijective map fa,r : Zn → Zn
by fa,r(x) = a.x + r( mod n)
similarly, define a bijective map gb,s : Zn → Zn
by gb,s(x) = b.x + s( mod n)
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 9 / 19
bibliography
Define A = [fa,r(i) + ga,r(j)( mod n)]
A is a Latin square of order n based on Zn
By simple corollary, A = [(i + j)( mod n)] a Latin square of order n
based on Zn
B = [(a.i + j)( mod n)] a Latin square of order n based on Zn
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 10 / 19
bibliography
Let m = 2n + 1
Construct an m × m matrix C as follows
C = [cij] = [(n + 1)(i + j)( mod m)]
C is a Latin square of order m based on Zm
This is the beautiful example of idempotent symmetric Latin
square of odd order
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 11 / 19
bibliography
For any fixed non negative integer k, m = 2k+1 + 5
Construct m × m matrix D as follows
D = [dij] = [(2k+3)(i + j)( mod m)]
for i, j ∈ {0, 1, 2, . . . , 2k+1 + 4}
This D also an idempotent symmetric Latin square of order m
based on Zm
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 12 / 19
bibliography
Let us construct more generally idempotent symmectric Latin
square
Let m = 2k+1 + p, where p is odd prime
Define a matrix of order m by
X = [xij] = [[2k + (p + 1/2)](i + j)( mod m)]
i, j ∈ {0, 1, 2, . . . , 2k+1 + p − 1}
X is idempotent symmetric Latin square of order m based on Zm
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 13 / 19
bibliography
Let p be any given odd prime
Let us select a positive integer e such that (e, p − 1) = 1
Define a matrix X of order p × p as follows
X = [xij] = [(p + 1/2).(ie + je)( mod p)]
i, j ∈ {0, 1, 2, . . . , p − 1} is a symmetric Latin square
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 14 / 19
bibliography
Construct an RSA public key cryptography Latin square
Select two distinct very large odd primes p, q such that n = pq
Select two fixed positive integers e, d such that
(e, (p − 1)(q − 1)) = 1 and (d, (p − 1)(q − 1)) = 1
Now define a matrix A = [ie + jd( mod n)]
A is a Latin square of order n based on Zn
B = [(aie + j)( mod n)] where (a, pq) = 1
Then B is a latin square of order n ( Here a, e are fixed )
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 15 / 19
bibliography
REFERENCES
Adi Shamir, (1979), How to share a secret, Communications of the
ACM 22 (11) 612-613.
Asmuth, C., Bloom, J.: A modular approach to key safeguarding.
IEEE Trans. inform. Theory, 29 (1983) 208Öš10.
S. Barnard, J.M. Child, Higher Algebra, The Macmillan and Co.,
1952.
R. Balakrishnan and K. Ranganathan, A textbook of Graph Theory,
Springer, Berlin, 2000.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 16 / 19
bibliography
REFERENCES
Beimel. A, Secret-sharing schemes: a survey, Proceedings of the
Third international conference on Coding and cryptology, Berlin,
Heidelberg, 2011, Springer-Verlag, IWCC’11, pages 11-46.
E.R.Berlekamp, Algebraic Coding Theory, NY, McGraw-Hill, 1968.
Blakley, G. R. (1979), Safeguarding cryptographic keys,
Proceedings of the National Computer Conference 48, 313-317.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 17 / 19
bibliography
REFERENCES
I. N. Herstein, Topics in Algebra, 2nd Edition, Wiley, 1975.
Chandramowliswaran. N,Srinivasan. S,Muralikrishna. P,
Authenticated key distribution using given set of primes for secret
sharing, Journal of Systems Science and Control Engineering
(Taylor and Francis), No 3 (2015) 106-112.
Srinivasan. S, Muralikrishna. P, Chandramowliswaran. N,
Authenticated Multiple Key Distribution using Simple Continued
Fraction, International Journal of Pure and Applied Mathematics,
87 No 2 (2013) 349-354.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 18 / 19
bibliography
REFERENCES
Muralikrishna. P, Srinivasan. S , Chandramowliswaran. N, Secure
Schemes for Secret Sharing and Key Distribution using Pell’s
equation, International Journal of Pure and Applied Mathematics,
85 No 5 (2013) 933-937.
Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery, An
Introduction to the Theory of Numbers, John Wiley.
Tom M. Apostol, Introduction to Analytic Number Theory, Springer.
Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 19 / 19

More Related Content

What's hot

What's hot (20)

A common fixed point of integral type contraction in generalized metric spacess
A  common fixed point of integral type contraction in generalized metric spacessA  common fixed point of integral type contraction in generalized metric spacess
A common fixed point of integral type contraction in generalized metric spacess
 
Scattering theory analogues of several classical estimates in Fourier analysis
Scattering theory analogues of several classical estimates in Fourier analysisScattering theory analogues of several classical estimates in Fourier analysis
Scattering theory analogues of several classical estimates in Fourier analysis
 
A sharp nonlinear Hausdorff-Young inequality for small potentials
A sharp nonlinear Hausdorff-Young inequality for small potentialsA sharp nonlinear Hausdorff-Young inequality for small potentials
A sharp nonlinear Hausdorff-Young inequality for small potentials
 
Pullbacks and Pushouts in the Category of Graphs
Pullbacks and Pushouts in the Category of GraphsPullbacks and Pushouts in the Category of Graphs
Pullbacks and Pushouts in the Category of Graphs
 
Density theorems for anisotropic point configurations
Density theorems for anisotropic point configurationsDensity theorems for anisotropic point configurations
Density theorems for anisotropic point configurations
 
some unusual questions for class xi year
some unusual questions for class xi year some unusual questions for class xi year
some unusual questions for class xi year
 
A Szemeredi-type theorem for subsets of the unit cube
A Szemeredi-type theorem for subsets of the unit cubeA Szemeredi-type theorem for subsets of the unit cube
A Szemeredi-type theorem for subsets of the unit cube
 
Group Actions
Group ActionsGroup Actions
Group Actions
 
Total Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph OperationsTotal Dominating Color Transversal Number of Graphs And Graph Operations
Total Dominating Color Transversal Number of Graphs And Graph Operations
 
Bellman functions and Lp estimates for paraproducts
Bellman functions and Lp estimates for paraproductsBellman functions and Lp estimates for paraproducts
Bellman functions and Lp estimates for paraproducts
 
Boundedness of the Twisted Paraproduct
Boundedness of the Twisted ParaproductBoundedness of the Twisted Paraproduct
Boundedness of the Twisted Paraproduct
 
Density theorems for Euclidean point configurations
Density theorems for Euclidean point configurationsDensity theorems for Euclidean point configurations
Density theorems for Euclidean point configurations
 
Group {1, −1, i, −i} Cordial Labeling of Product Related Graphs
Group {1, −1, i, −i} Cordial Labeling of Product Related GraphsGroup {1, −1, i, −i} Cordial Labeling of Product Related Graphs
Group {1, −1, i, −i} Cordial Labeling of Product Related Graphs
 
Ji2416271633
Ji2416271633Ji2416271633
Ji2416271633
 
L(2,1)-labeling
L(2,1)-labelingL(2,1)-labeling
L(2,1)-labeling
 
BCA_Semester-II-Discrete Mathematics_unit-i Group theory
BCA_Semester-II-Discrete Mathematics_unit-i Group theoryBCA_Semester-II-Discrete Mathematics_unit-i Group theory
BCA_Semester-II-Discrete Mathematics_unit-i Group theory
 
Some Examples of Scaling Sets
Some Examples of Scaling SetsSome Examples of Scaling Sets
Some Examples of Scaling Sets
 
kunci jawaban grup
kunci jawaban grupkunci jawaban grup
kunci jawaban grup
 
A new generalized lindley distribution
A new generalized lindley distributionA new generalized lindley distribution
A new generalized lindley distribution
 
SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS SUPER MAGIC CORONATIONS OF GRAPHS
SUPER MAGIC CORONATIONS OF GRAPHS
 

Viewers also liked

Recognition Letter
Recognition LetterRecognition Letter
Recognition Letter
Sylvia Dao
 
Charla protocolo busqueda_de_origenes
Charla protocolo busqueda_de_origenesCharla protocolo busqueda_de_origenes
Charla protocolo busqueda_de_origenes
marisaolivamorales
 

Viewers also liked (20)

testimonial_iit_3 (3)
testimonial_iit_3 (3)testimonial_iit_3 (3)
testimonial_iit_3 (3)
 
Raah e khuda main kharch karnay kay fazail.sindhi
Raah e khuda main kharch karnay kay fazail.sindhiRaah e khuda main kharch karnay kay fazail.sindhi
Raah e khuda main kharch karnay kay fazail.sindhi
 
Recognition Letter
Recognition LetterRecognition Letter
Recognition Letter
 
Redes
Redes Redes
Redes
 
Mit2 72s09 lec03
Mit2 72s09 lec03Mit2 72s09 lec03
Mit2 72s09 lec03
 
Semiramide Food Srl
Semiramide Food SrlSemiramide Food Srl
Semiramide Food Srl
 
È ora di piantarla? Liberalizzazione della cannabis in Italia
È ora di piantarla? Liberalizzazione della cannabis in ItaliaÈ ora di piantarla? Liberalizzazione della cannabis in Italia
È ora di piantarla? Liberalizzazione della cannabis in Italia
 
Pedagogia educacion-y-formacion
Pedagogia educacion-y-formacionPedagogia educacion-y-formacion
Pedagogia educacion-y-formacion
 
1º bachillerato.
1º bachillerato.1º bachillerato.
1º bachillerato.
 
KnowledgeFlood: Sharing Volunteers' Experience on Flood Disaster Using Storyt...
KnowledgeFlood: Sharing Volunteers' Experience on Flood Disaster Using Storyt...KnowledgeFlood: Sharing Volunteers' Experience on Flood Disaster Using Storyt...
KnowledgeFlood: Sharing Volunteers' Experience on Flood Disaster Using Storyt...
 
Lobbyists. Pride and Prejudice
Lobbyists. Pride and PrejudiceLobbyists. Pride and Prejudice
Lobbyists. Pride and Prejudice
 
Charla protocolo busqueda_de_origenes
Charla protocolo busqueda_de_origenesCharla protocolo busqueda_de_origenes
Charla protocolo busqueda_de_origenes
 
KoBo Toolbox
KoBo ToolboxKoBo Toolbox
KoBo Toolbox
 
Group Theory
Group TheoryGroup Theory
Group Theory
 
Exploring the Use of Storytelling as Knowledge Transfer Tool in Organizations
Exploring the Use of Storytelling as Knowledge Transfer Tool in OrganizationsExploring the Use of Storytelling as Knowledge Transfer Tool in Organizations
Exploring the Use of Storytelling as Knowledge Transfer Tool in Organizations
 
Ocular motility and strabismus
Ocular motility and strabismusOcular motility and strabismus
Ocular motility and strabismus
 
Solucionario semana-n-1-ciclo-ordinario-2015-ii
Solucionario semana-n-1-ciclo-ordinario-2015-iiSolucionario semana-n-1-ciclo-ordinario-2015-ii
Solucionario semana-n-1-ciclo-ordinario-2015-ii
 
Application of Gauss,Green and Stokes Theorem
Application of Gauss,Green and Stokes TheoremApplication of Gauss,Green and Stokes Theorem
Application of Gauss,Green and Stokes Theorem
 
Viva luis pardo
Viva luis pardoViva luis pardo
Viva luis pardo
 
Pomelo y limon
Pomelo y limonPomelo y limon
Pomelo y limon
 

Similar to NCM Latin squares talk

Wild knots in higher dimensions as limit sets of kleinian groups
Wild knots in higher dimensions as limit sets of kleinian groupsWild knots in higher dimensions as limit sets of kleinian groups
Wild knots in higher dimensions as limit sets of kleinian groups
Paulo Coelho
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
Michael Soltys
 
Bab 11 matriks SPM 2015
Bab 11 matriks SPM 2015Bab 11 matriks SPM 2015
Bab 11 matriks SPM 2015
aloysiusapat
 

Similar to NCM Latin squares talk (20)

Wild knots in higher dimensions as limit sets of kleinian groups
Wild knots in higher dimensions as limit sets of kleinian groupsWild knots in higher dimensions as limit sets of kleinian groups
Wild knots in higher dimensions as limit sets of kleinian groups
 
On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...
On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...
On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...
 
On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...
On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...
On Some Notable Properties of Zero Divisors in the Ring of Integers Modulo m ...
 
Some Results on the Group of Lower Unitriangular Matrices L(3,Zp)
Some Results on the Group of Lower Unitriangular Matrices L(3,Zp)Some Results on the Group of Lower Unitriangular Matrices L(3,Zp)
Some Results on the Group of Lower Unitriangular Matrices L(3,Zp)
 
NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)
NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)
NCM LECTURE NOTES ON LATIN SQUARES(27) (1) (1)
 
NCM LECTURE NOTES ON LATIN SQUARES(27)
NCM LECTURE NOTES ON LATIN SQUARES(27)NCM LECTURE NOTES ON LATIN SQUARES(27)
NCM LECTURE NOTES ON LATIN SQUARES(27)
 
Polyadic systems and multiplace representations
Polyadic systems and multiplace representationsPolyadic systems and multiplace representations
Polyadic systems and multiplace representations
 
g-lecture.pptx
g-lecture.pptxg-lecture.pptx
g-lecture.pptx
 
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theoremS. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
S. Duplij, A q-deformed generalization of the Hosszu-Gluskin theorem
 
Fixed Point Theorem in Fuzzy Metric Space
Fixed Point Theorem in Fuzzy Metric SpaceFixed Point Theorem in Fuzzy Metric Space
Fixed Point Theorem in Fuzzy Metric Space
 
Crystallographic groups
Crystallographic groupsCrystallographic groups
Crystallographic groups
 
Rational points on elliptic curves
Rational points on elliptic curvesRational points on elliptic curves
Rational points on elliptic curves
 
A common fixed point theorem in cone metric spaces
A common fixed point theorem in cone metric spacesA common fixed point theorem in cone metric spaces
A common fixed point theorem in cone metric spaces
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
 
Compatible Mapping and Common Fixed Point Theorem
Compatible Mapping and Common Fixed Point TheoremCompatible Mapping and Common Fixed Point Theorem
Compatible Mapping and Common Fixed Point Theorem
 
One modulo n gracefulness of
One modulo n gracefulness ofOne modulo n gracefulness of
One modulo n gracefulness of
 
Bab 11 matriks SPM 2015
Bab 11 matriks SPM 2015Bab 11 matriks SPM 2015
Bab 11 matriks SPM 2015
 
McKay's Algorithm for Isomorph-free Exhaustive Generation
McKay's Algorithm for Isomorph-free Exhaustive GenerationMcKay's Algorithm for Isomorph-free Exhaustive Generation
McKay's Algorithm for Isomorph-free Exhaustive Generation
 
The Probability that a Matrix of Integers Is Diagonalizable
The Probability that a Matrix of Integers Is DiagonalizableThe Probability that a Matrix of Integers Is Diagonalizable
The Probability that a Matrix of Integers Is Diagonalizable
 
K-algebras on quadripartitioned single valued neutrosophic sets
K-algebras on quadripartitioned single valued neutrosophic setsK-algebras on quadripartitioned single valued neutrosophic sets
K-algebras on quadripartitioned single valued neutrosophic sets
 

More from NARAYANASWAMY CHANDRAMOWLISWARAN (20)

NCM RB PAPER
NCM RB PAPERNCM RB PAPER
NCM RB PAPER
 
ncm SCSVMV
ncm SCSVMVncm SCSVMV
ncm SCSVMV
 
m.tech final
m.tech finalm.tech final
m.tech final
 
M.tech.quiz (1)
M.tech.quiz (1)M.tech.quiz (1)
M.tech.quiz (1)
 
FDP SumCourse Schedule July 2009 (1)
FDP SumCourse Schedule July  2009 (1)FDP SumCourse Schedule July  2009 (1)
FDP SumCourse Schedule July 2009 (1)
 
FDP
FDPFDP
FDP
 
FDP-libre(1)
FDP-libre(1)FDP-libre(1)
FDP-libre(1)
 
15
1515
15
 
11
1111
11
 
feedback_IIM_Indore
feedback_IIM_Indorefeedback_IIM_Indore
feedback_IIM_Indore
 
Proceedings
ProceedingsProceedings
Proceedings
 
cryptography_non_abeliean
cryptography_non_abelieancryptography_non_abeliean
cryptography_non_abeliean
 
testimonial-iit_1 (4)
testimonial-iit_1 (4)testimonial-iit_1 (4)
testimonial-iit_1 (4)
 
NCM LECTURE NOTES ON I . n. herestein cryptography(3)
NCM LECTURE NOTES ON  I . n. herestein cryptography(3)NCM LECTURE NOTES ON  I . n. herestein cryptography(3)
NCM LECTURE NOTES ON I . n. herestein cryptography(3)
 
japan-invite
japan-invitejapan-invite
japan-invite
 
kyoto-seminar
kyoto-seminarkyoto-seminar
kyoto-seminar
 
graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)graceful Trees through Graceful codes (1)
graceful Trees through Graceful codes (1)
 
R.S.A Encryption
R.S.A EncryptionR.S.A Encryption
R.S.A Encryption
 
NCM Graph theory talk
NCM Graph theory talkNCM Graph theory talk
NCM Graph theory talk
 
scsvmv-testimonial
scsvmv-testimonialscsvmv-testimonial
scsvmv-testimonial
 

NCM Latin squares talk

  • 1. bibliography Combinatorial conditions for secret sharing for Public Key Cryptography by Dr. N. Chandramowliswaran Professor Applied Sciences, NCU, Gurgaon FEB. 27, 2016 Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 1 / 19
  • 2. bibliography Latin Squares Definition 1 Let n be a given positive integer and S = {s1, s2, . . . , sn} be a given set of n distinct elements. A Latin square of order n based on S is an n × n array in which every element of S occurs exactly once in each row and exactly once in each column. Thus each of the rows and columns of a Latin square is a permutation of S. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 2 / 19
  • 3. bibliography Let G be a finite group of n elements Suppose f : G × G → G such that f(gi, gj) = gi ∗ gj ∈ G For a fixed i, gi ∗ gj is a permutation on G for all j varies from 1 to n Similarly, for a fixed j, gj ∗ gi is a permutation on G for all i varies from 1 to n such a function f is called a Latin function defined on G × G to G Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 3 / 19
  • 4. bibliography Let G = {g1, g2, . . . , gi, . . . , gj, . . . , gn} Assume g1 = e, the identity element of G Define an n × n matrix A by A = [aij] = [gi ∗ gj] A is a Latin square of order n based on G the i-th row of A = {gi ∗ g1, gi ∗ g2, . . . , gi ∗ gi, . . . , gi ∗ gj, . . . , gi ∗ gn} and the j-th column of A = {g1 ∗ gj, g2 ∗ gj, . . . , gi ∗ gj, . . . , gj ∗ gj, . . . , gn ∗ gj} Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 4 / 19
  • 5. bibliography Theorem 1: Let G be a finite group of order |G| i.e., G = {g1, g2, . . . , gi, . . . , gj, . . . , g|G|}. Let m and n be any two positive integers such that (m, |G|) = (n, |G|) = 1. Define |G| × |G| matrix A as A = [gm i .gn j ]; i, j ∈ {1, 2, 3, , |G|}. Then A is a Latin square of order |G|. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 5 / 19
  • 6. bibliography Theorem 2: Let a and b be any two fixed elements of a finite group G. Define A = [(a ∗ gi) ∗ (gj ∗ b)], B = [(a ∗ gi) ∗ (b ∗ gj)], C = [(gi ∗ a) ∗ (gj ∗ b)] and D = [(gi ∗ a) ∗ (b ∗ gj)]. Then A, B, C and D are all Latin squares of order |G|. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 6 / 19
  • 7. bibliography Theorem 3: Let T1, T2 be any two automorphisms of a finite group of G. Define |G| × |G| matrix A as A = [T1(gi) ∗ T2(gj)]. Then A is a Latin square of order |G|. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 7 / 19
  • 8. bibliography Let n be any positive integer Zn = {0, 1, . . . , n − 1}, the set of integers modulo n +n and ×n is the addition and multiplication (mod n) defined on Zn Define Z∗ n = Zn − {0} with a lies in Z∗ n if and only if (a, n) = 1 Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 8 / 19
  • 9. bibliography select a, b lies in Z∗ n with [(a, n) = (b, n) = 1] select r and s lies in Zn Define a bijective map fa,r : Zn → Zn by fa,r(x) = a.x + r( mod n) similarly, define a bijective map gb,s : Zn → Zn by gb,s(x) = b.x + s( mod n) Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 9 / 19
  • 10. bibliography Define A = [fa,r(i) + ga,r(j)( mod n)] A is a Latin square of order n based on Zn By simple corollary, A = [(i + j)( mod n)] a Latin square of order n based on Zn B = [(a.i + j)( mod n)] a Latin square of order n based on Zn Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 10 / 19
  • 11. bibliography Let m = 2n + 1 Construct an m × m matrix C as follows C = [cij] = [(n + 1)(i + j)( mod m)] C is a Latin square of order m based on Zm This is the beautiful example of idempotent symmetric Latin square of odd order Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 11 / 19
  • 12. bibliography For any fixed non negative integer k, m = 2k+1 + 5 Construct m × m matrix D as follows D = [dij] = [(2k+3)(i + j)( mod m)] for i, j ∈ {0, 1, 2, . . . , 2k+1 + 4} This D also an idempotent symmetric Latin square of order m based on Zm Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 12 / 19
  • 13. bibliography Let us construct more generally idempotent symmectric Latin square Let m = 2k+1 + p, where p is odd prime Define a matrix of order m by X = [xij] = [[2k + (p + 1/2)](i + j)( mod m)] i, j ∈ {0, 1, 2, . . . , 2k+1 + p − 1} X is idempotent symmetric Latin square of order m based on Zm Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 13 / 19
  • 14. bibliography Let p be any given odd prime Let us select a positive integer e such that (e, p − 1) = 1 Define a matrix X of order p × p as follows X = [xij] = [(p + 1/2).(ie + je)( mod p)] i, j ∈ {0, 1, 2, . . . , p − 1} is a symmetric Latin square Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 14 / 19
  • 15. bibliography Construct an RSA public key cryptography Latin square Select two distinct very large odd primes p, q such that n = pq Select two fixed positive integers e, d such that (e, (p − 1)(q − 1)) = 1 and (d, (p − 1)(q − 1)) = 1 Now define a matrix A = [ie + jd( mod n)] A is a Latin square of order n based on Zn B = [(aie + j)( mod n)] where (a, pq) = 1 Then B is a latin square of order n ( Here a, e are fixed ) Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 15 / 19
  • 16. bibliography REFERENCES Adi Shamir, (1979), How to share a secret, Communications of the ACM 22 (11) 612-613. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. inform. Theory, 29 (1983) 208Öš10. S. Barnard, J.M. Child, Higher Algebra, The Macmillan and Co., 1952. R. Balakrishnan and K. Ranganathan, A textbook of Graph Theory, Springer, Berlin, 2000. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 16 / 19
  • 17. bibliography REFERENCES Beimel. A, Secret-sharing schemes: a survey, Proceedings of the Third international conference on Coding and cryptology, Berlin, Heidelberg, 2011, Springer-Verlag, IWCC’11, pages 11-46. E.R.Berlekamp, Algebraic Coding Theory, NY, McGraw-Hill, 1968. Blakley, G. R. (1979), Safeguarding cryptographic keys, Proceedings of the National Computer Conference 48, 313-317. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 17 / 19
  • 18. bibliography REFERENCES I. N. Herstein, Topics in Algebra, 2nd Edition, Wiley, 1975. Chandramowliswaran. N,Srinivasan. S,Muralikrishna. P, Authenticated key distribution using given set of primes for secret sharing, Journal of Systems Science and Control Engineering (Taylor and Francis), No 3 (2015) 106-112. Srinivasan. S, Muralikrishna. P, Chandramowliswaran. N, Authenticated Multiple Key Distribution using Simple Continued Fraction, International Journal of Pure and Applied Mathematics, 87 No 2 (2013) 349-354. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 18 / 19
  • 19. bibliography REFERENCES Muralikrishna. P, Srinivasan. S , Chandramowliswaran. N, Secure Schemes for Secret Sharing and Key Distribution using Pell’s equation, International Journal of Pure and Applied Mathematics, 85 No 5 (2013) 933-937. Ivan Niven, Herbert S. Zuckerman and Hugh L. Montgomery, An Introduction to the Theory of Numbers, John Wiley. Tom M. Apostol, Introduction to Analytic Number Theory, Springer. Dr. N. Chandramowliswaran (NCU) INVITED TALK FEB. 27, 2016 19 / 19