POST Quantum Cryptography from Mutant Prime Knots
Abstract
By resorting to basic features of topological knot theory we propose a (classical) cryptographic protocol based on the `difficulty' of decomposing complex knots generated as connected sums of prime knots and their mutants. The scheme combines an asymmetric public key protocol with symmetric private ones and is intrinsecally secure against quantum eavesdropper attacks.
- Publication:
-
International Journal of Geometric Methods in Modern Physics
- Pub Date:
- 2011
- DOI:
- arXiv:
- arXiv:1010.2055
- Bibcode:
- 2011IJGMM..08.1571M
- Keywords:
-
- Mathematical Physics;
- Computer Science - Cryptography and Security;
- Quantum Physics;
- 68QXX (Theory of computing) 57M27 (Invariants of knots and 3-manifolds) 68Q17 (Computational difficulty of problems)
- E-Print:
- 14 pages, 5 figures