A Cryptographic Application of the M-Injectivity of ๐‘€๐‘›(๐‘๐‘) Over Itself
Wannarisuk Nongbsap1, Madan Mohan Singh2
1Wannarisuk Nongbsap*, Assistant Professor, Department of Mathematics, St. Anthony’s College, Shillong, Meghalaya, India.
2Dr. Madan Mohan Singh, Associate Professor, Department of Basic Sciences and Social Sciences, School of Technology, North Eastern Hill University, Shillong, Meghalaya, India.

Manuscript received on September 09, 2021. | Revised Manuscript received on September 16, 2021. | Manuscript published on September 30, 2021. | PP: 7-14 | Volume-10 Issue-4, November 2021. | Retrieval Number: 100.1/ijrte.D65151110421 | DOI: 10.35940/ijrte.D6515.1110421
Open Access | Ethics and Policies | Cite | Mendeley
ยฉ The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper, we present a public key scheme using Discrete Logarithm problem, proposed by Diffie and Hellman (DLP)[1], particularly known as the Computational Diffie-Hellman Problem (CDH)[12]. This paper uses the Elgamal encryption scheme [6] and extends it so that more than one message can be sent. The combination of Hill Cipher[14 ] and the property of the matrix ring ๐‘ด๐’(๐’๐’‘), of being left m-injective over itself, where ๐’‘ is a very large prime, are major contributions towards the proposal of this scheme.
Keywords: m-injective, ๐‘น-monomorphisms, ๐‘ด๐’(๐’๐’‘), public key cryptography, Discrete Logarithm Problem, Computational Diffie-Hellman Problem, Hill Cipher.