Next Article in Journal
An Online Energy Management Control for Hybrid Electric Vehicles Based on Neuro-Dynamic Programming
Previous Article in Journal
Bilayer Local Search Enhanced Particle Swarm Optimization for the Capacitated Vehicle Routing Problem
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography

by
Temitope Gbolahan Jaiyeola
1 and
Florentin Smarandache
2,*
1
Department of Mathematics, Obafemi Awolowo University, Ile Ife 220005, Nigeria
2
Department of Mathematics and Science, University of New Mexico, 705 Gurley Ave., Gallup, NM 87301, USA
*
Author to whom correspondence should be addressed.
Algorithms 2018, 11(3), 32; https://doi.org/10.3390/a11030032
Submission received: 7 February 2018 / Revised: 11 March 2018 / Accepted: 12 March 2018 / Published: 16 March 2018

Abstract

:
This paper is the first study of the neutrosophic triplet loop (NTL) which was originally introduced by Florentin Smarandache. NTL originated from the neutrosophic triplet set X: a collection of triplets ( x , n e u t ( x ) , a n t i ( x ) ) for an x X which obeys some axioms (existence of neutral(s) and opposite(s)). NTL can be informally said to be a neutrosophic triplet group that is not associative. That is, a neutrosophic triplet group is an NTL that is associative. In this study, NTL with inverse properties such as: right inverse property (RIP), left inverse property (LIP), right cross inverse property (RCIP), left cross inverse property (LCIP), right weak inverse property (RWIP), left weak inverse property (LWIP), automorphic inverse property (AIP), and anti-automorphic inverse property are introduced and studied. The research was carried out with the following assumptions: the inverse property (IP) is the RIP and LIP, cross inverse property (CIP) is the RCIP and LCIP, weak inverse property (WIP) is the RWIP and LWIP. The algebraic properties of neutrality and opposite in the aforementioned inverse property NTLs were investigated, and they were found to share some properties with the neutrosophic triplet group. The following were established: (1) In a CIPNTL (IPNTL), RIP (RCIP) and LIP (LCIP) were equivalent; (2) In an RIPNTL (LIPNTL), the CIP was equivalent to commutativity; (3) In a commutative NTL, the RIP, LIP, RCIP, and LCIP were found to be equivalent; (4) In an NTL, IP implied anti-automorphic inverse property and WIP, RCIP implied AIP and RWIP, while LCIP implied AIP and LWIP; (5) An NTL has the IP (CIP) if and only if it has the WIP and anti-automorphic inverse property (AIP); (6) A CIPNTL or an IPNTL was a quasigroup; (7) An LWIPNTL (RWIPNTL) was a left (right) quasigroup. The algebraic behaviours of an element, its neutral and opposite in the associator and commutator of a CIPNTL or an IPNTL were investigated. It was shown that ( Z p , ) where x y = ( p 1 ) ( x + y ) , for any prime p, is a non-associative commutative CIPNTL and IPNTL. The application of some of these varieties of inverse property NTLs to cryptography is discussed.

1. Introduction

1.1. Generalized Group

A generalized group is an algebraic structure which has a deep physical background in the unified gauge theory and has direct relation with isotopies. Mathematicians and physicists have been trying to construct a suitable unified theory for twistor theory, isotopies theory, and so on. It was known that generalized groups are tools for constructions in unified geometric theory and electroweak theory. Electroweak theories are essentially structured on Minkowskian axioms, and gravitational theories are constructed on Riemannian axioms. According to Araujo et. al. [1], the generalized group is equivalent to the notion of a completely simple semigroup.
Some of the structures and properties of generalized groups have been studied by Vagner [2], Molaei [3,4], Mehrabi, Molaei, and Oloomi [5], Agboola [6], Adeniran et al. [7], and Fatehi and Molaei [8]. Smooth generalized groups were introduced in Agboola [9], and later Agboola [10] also presented smooth generalized subgroups while Molaei [11], Molaei and Tahmoresi [12] considered the notion of topological generalized groups, and Maleki and Molaei [13] studied the quotient space of generalized groups.
Definition 1.
(Generalized Group)
A generalized group G is a non-empty set admitting a binary operation called multiplication, subject to the set of rules given below.
(i) 
( x y ) z = x ( y z ) for all x , y , z G .
(ii) 
For each x G , there exists a unique e ( x ) G such that x e ( x ) = e ( x ) x = x (existence and uniqueness of identity element).
(iii) 
For each x G , there exists x 1 G such that x x 1 = x 1 x = e ( x ) (existence of inverse element).
Definition 2.
Let L be a non-empty set. Define a binary operation (·) on L. If x · y L for all x , y L , ( L , · ) is called a groupoid.
If the equation a · x = b (resp. y · a = b ) has a unique solution relative to x (resp. y) (i.e., obeys the left (resp. right) cancellation law), then ( L , · ) is called a left (resp. right) quasigroup. If a groupoid ( L , · ) is both a left quasigroup and right quasigroup, then it is called a quasigroup. If there exists an element e L called the identity element such that for all x L , x · e = e · x = x , then a quasigroup ( L , · ) is called a loop.
For more on quasigroups and loops, readers should check [14,15,16,17,18,19,20].
Definition 3.
(Generalized loop)
A generalized loop is the pair ( G , · ) where G is a non-empty set and “·” a binary operation such that the following are true.
(i) 
( G , · ) is a groupoid.
(ii) 
For each x G , there exists a unique e ( x ) G such that x e ( x ) = e ( x ) x = x .
(iii) 
For each x G , there exists x 1 G such that x x 1 = x 1 x = e ( x ) .
A generalized group G exhibits the following properties:
(i)
For each x G , there exists a unique x 1 G .
(ii)
e ( e ( x ) ) = e ( x ) and e ( x 1 ) = e ( x ) whenever x G .
(iii)
If G is commutative, then G is a group.

1.2. Neutrosophic Triplet Group

Neutrosophy is a new branch of philosophy which studies the nature, origin, and scope of neutralities as well as their interaction with ideational spectra. In 1995, Florentin Smarandache [21] first introduced the concept of neutrosophic logic and neutrosophic sets where each proposition in neutrosophic logic is approximated to have the percentage of truth in a subset T, the percentage of indeterminacy in a subset I, and the percentage of falsity in a subset F so that this neutrosophic logic is called an extension of fuzzy logic, especially to intuitionistic fuzzy logic. In fact, the neutrosophic set is the generalization of classical sets [22], fuzzy sets [23], intuitionistic fuzzy sets [22,24] and interval valued fuzzy sets [22], to mention a few. This mathematical tool is used to handle problems consisting of uncertainty, imprecision, indeterminacy, inconsistency, incompleteness, and falsity. The development process of neutrosophic sets, fuzzy sets, and intuitionistic fuzzy sets are still growing, with various applications; here are some recent research works in these directions [25,26,27,28,29,30,31,32]. By utilizing the idea of neutrosophic theory, Vasantha Kandasamy and Florentin Smarandache studied neutrosophic algebraic structures in [33,34,35] by introducing an indeterminate element “I” in the algebraic structure and then combining “I” with each element of the structure with respect to the corresponding binary operation ∗. This was called a neutrosophic element, and the generated algebraic structure was termed a neutrosophic algebraic structure. They further studied several neutrosophic algebraic structures, such as neutrosophic fields, neutrosophic vector spaces, neutrosophic groups, neutrosophic bigroups, neutrosophic N-groups, neutrosophic semigroups, neutrosophic bisemigroups, neutrosophic N-semigroups, neutrosophic loops, neutrosophic biloops, neutrosophic N-loops, neutrosophic groupoids, neutrosophic bigroupoids, and so on.
Smarandache and Ali [36] for the first time introduced the idea of the neutrosophic triplet, which they had previously discussed in [37]. They used these neutrosophic triplets to introduce the neutrosophic triplet group, which is different from the classical group both in structural and fundamental properties. They gave distinction and comparison of neutrosophic triplet group with the classical generalized group. They also drew a brief sketch of the possible applications of the neutrosophic triplet group in some other research areas. Jaiyéọlá [38] studied new algebraic properties of the neutrosophic triplet group with new applications. Some new applications of neutrosophy were announced in Okpako and Asagba [39], Sahin and Kargin [40], Vasantha Kandasamy et al. [41], and Smarandache [42]. Agboola et al. [43] and Zhang et al. [44] are some recent works on neutrosophic triplet groups, neutrosophic quadruple, and neutrosophic duplet of algebraic structures.
Definition 4.
(Neutrosophic Triplet Set)
Let X be a set together with a binary operation ∗ defined on it. Then, X is called a neutrosophic triplet set if for any x X , there exists a neutral of “x” denoted by n e u t ( x ) (not necessarily the identity element) andan opposite of “x” denoted by a n t i ( x ) or x J , with n e u t ( x ) , a n t i ( x ) X such that:
x n e u t ( x ) = n e u t ( x ) x = x a n d x a n t i ( x ) = a n t i ( x ) x = n e u t ( x ) .
The elements x , n e u t ( x ) , and a n t i ( x ) are collectively referred to as a neutrosophic triplet, and denoted by ( x , n e u t ( x ) , a n t i ( x ) ) .
Remark 1.
For the same x X , each n e u t ( x ) and a n t i ( x ) may not be unique. In a neutrosophic triplet set ( X , ) , an element y (resp. z) is the second (resp. third) component of a neutrosophic triplet if there exist x , z X ( x , y X ) such that x y = y x = x and x z = z x = y . Thus, ( x , y , z ) is the neutrosophic triplet.
Example 1.
(Smarandache and Ali [36])
Consider ( Z 6 , × 6 ) where Z 6 = { 0 , 1 , 2 , 3 , 4 , 5 } and × 6 is multiplication in modulo 6. ( 2 , 4 , 2 ) , ( 4 , 4 , 4 ) , and ( 0 , 0 , 0 ) are neutrosophic triplets, but 3 does not give rise to a neutrosophic triplet.
Definition 5.
(Neutrosophic Triplet Group)
Let ( X , ) be a neutrosophic triplet set. Then, ( X , ) is called a neutrosophic triplet group if ( X , ) is a semigroup. If in addition, ( X , ) obeys the commutativity law, then ( X , ) is called a commutative neutrosophic triplet group.
Remark 2.
A neutrosophic triplet group is not a group in general, but a group is a neutrosophic triplet group where n e u t ( x ) = e the general identity element for all x X and a n t i ( x ) is unique for each x X .
1. 
A generalized loop is a generalized group if and only if it is associative.
2. 
A neutrosophic triplet loop (NTL) is a neutrosophic triplet group if and only if it is associative.
3. 
An NTL is a generalized loop if and only if n e u t ( x ) = e ( x ) is unique for each x.
4. 
An NTL is a loop if and only if it is a quasigroup and n e u t ( x ) = n e u t ( y ) for all x , y .
Example 2.
(Smarandache and Ali [36])
Consider ( Z 10 , ) where x y = 3 x y mod 10 . ( Z 10 , ) is a commutative neutrosophic triplet group but neither a classical group nor a generalized group.
Example 3.
(Smarandache and Ali [36])
Consider ( Z 10 , ) where x y = 5 x + y mod 10 . ( Z 10 , ) is a non-commutative neutrosophic triplet group, but not a classical group.
Theorem 1.
(Smarandache and Ali [36])
Let ( X , ) be a neutrosophic triplet group. The following are true for all x , y , z X .
1.
x y = x z n e u t ( x ) y = n e u t ( x ) z .
2.
y x = z x y n e u t ( x ) = z n e u t ( x ) .
3.
a n t i ( x ) y = a n t i ( x ) z n e u t ( x ) y = n e u t ( x ) z .
4.
y a n t i ( x ) = z a n t i ( x ) y n e u t ( x ) = z n e u t ( x ) .
5.
n e u t ( x ) n e u t ( x ) = n e u t ( x ) i.e., n e u t n e u t ( x ) = n e u t ( x ) .
6.
n e u t ( x ) n = n e u t ( x ) for any n N ; a n t i ( n e u t ( x ) ) = n e u t ( x ) .
7.
n e u t ( x ) a n t i ( x ) = a n t i ( x ) n e u t ( x ) = a n t i ( x ) i.e. n e u t a n t i ( x ) = n e u t ( x ) .
Definition 6.
(Neutrosophic Triplet Loop—NTL)
Let ( X , ) be a neutrosophic triplet set. Then, ( X , ) is called a neutrosophic triplet loop if ( X , ) is a groupoid. If in addition, ( X , ) obeys the commutativity law, then ( X , ) is called a commutative neutrosophic triplet loop.
Let ( X , ) be a neutrosophic triplet loop. If n e u t ( x y ) = n e u t ( x ) n e u t ( y ) for all x , y X , then X is called normal.
Remark 3.
An NTL is a neutrosophic triplet group if and only if it is associative. Thus, an NTL is a generalization of a neutrosophic triplet group, and it is interesting to study an NTL that obeys weak associative law. NTL was originally introduced by Florentin Smarandache.
Example 4.
Let ( Z 10 , + , · ) be the field of integers modulo 10. Consider ( Z 10 , ) , where for all x , y Z 10 , x y = 2 x + 2 y . The following are neutrosophic triplets:
( 0 , 0 , 0 ) , ( 0 , 0 , 5 ) , ( 2 , 4 , 0 ) , ( 2 , 4 , 5 ) , ( 4 , 8 , 0 ) , ( 4 , 8 , 5 ) , ( 6 , 2 , 0 ) , ( 6 , 2 , 5 ) , ( 8 , 6 , 0 ) , ( 8 , 6 , 5 )
in ( Z 10 , ) . Thus, { 0 , 2 , 4 , 5 , 6 , 8 } is a neutrosophic triplet set. ( Z 10 , ) is non-associative because ( x y ) z = 4 x + 4 y + 2 z x ( y z ) = 2 x + 4 y + 4 z . ( Z 10 , ) is a non-associative NTL (i.e., not a neutrosophic triplet group) with 2 n e u t ( x ) = 9 x and 4 a n t i ( x ) = 5 x .
Definition 7.
(Inverse Properties and Neutrosophic Triplet Loop)
( X , ) will be called a right inverse property neutrosophic triplet loop (RIPNTL) if it obeys the right inverse property (RIP)
( y x ) a n t i ( x ) = y
( X , ) will be called a left inverse property neutrosophic triplet loop (LIPNTL) if it obeys the left inverse property (LIP)
a n t i ( x ) ( x y ) = y
( X , ) will be called an inverse property neutrosophic triplet loop if it obeys both (1) and (2).
( X , ) will be called a left cross inverse property neutrosophic triplet loop (LCIPNTL) if it obeys the left cross inverse property (LCIP)
a n t i ( x ) ( y x ) = y
( X , ) will be called a right cross inverse property neutrosophic triplet loop (RCIPNTL) if it obeys the right cross inverse property (RCIP)
( x y ) a n t i ( x ) = y
( X , ) will be called a cross inverse property neutrosophic triplet loop (CIPNTL) if it obeys both (3) and (4).
( X , ) will be called a right weak inverse property neutrosophic triplet loop (RWIPNTL) if it obeys the right weak inverse property (RWIP)
x a n t i ( y x ) = a n t i ( y )
( X , ) will be called a left weak inverse property neutrosophic triplet loop (LWIPNTL) if it obeys the left weak inverse property (LWIP)
a n t i ( x y ) x = a n t i ( y )
( X , ) will be called a weak inverse property neutrosophic triplet loop (WIPNTL) if it obeys both (5) and (6).
( X , ) will be called an automorphic inverse property neutrosophic triplet loop (AIPNTL) if it obeys the automorphic inverse property (AIP)
a n t i ( x y ) = a n t i ( x ) a n t i ( y )
( X , ) will be called an antiautomorphic inverse property neutrosophic triplet loop (AAIPNTL) if it obeys the antiautomorphic inverse property (AAIP)
a n t i ( x y ) = a n t i ( y ) a n t i ( x )
( X , ) will be called a semi-automorphic inverse property neutrosophic triplet loop (SAIPNTL) if it obeys the semi-automorphic inverse property (SAIP)
a n t i ( x y ) x = a n t i ( x ) a n t i ( y ) a n t i ( x )
Definition 8.
(Associators and Commutators of Neutrosophic Triplet Loop)
Let ( X , ) be an NTL. For any x , y , z X ,
1 
( x , y , z ) X is called the right associator of x , y , z if x y z = ( x y z ) ( x , y , z ) .
2.
[ x , y , z ] X is called the left associator of x , y , z if x y z = [ x , y , z ] ( x y z ) .
3.
( x , y ) X is called the right commutator of x , y if x y = ( y x ) ( x , y ) .
4.
[ x , y ] X is called the right commutator of x , y if x y = [ x , y ] ( y x ) .
This paper is the first study of a class of neutrosophic triplet loop (NTL) containing varieties of inverse property NTLs and the application of some of them to cryptography. The second section contains the main results on the varieties of inverse property NTLs in Definition 7 and the interrelationships. The algebraic properties of their neutrality and opposite were investigated, and were found to share some properties with the neutrosophic triplet group. An example of these varieties of NTL is given. Summaries of the results in the second section are exhibited as two Hasse diagrams in Figure 1. The third section discusses the application of some of these varieties of inverse property NTLs to cryptography.

2. Main Results

Lemma 1.
Let X be a CIPNTL. Then:
1.
n e u t ( x ) = n e u t ( a n t i ( x ) ) , a n t i ( a n t i ( x ) ) = x and J 2 = I .
2.
L x R a n t i ( x ) = I = R x L a n t i ( x ) .
3.
X is an RIPNTL if and only X is an LIPNTL.
4.
n e u t ( x ) = a n t i ( n e u t ( x ) ) and n e u t ( n e u t ( x ) ) = n e u t ( x ) n e u t ( x ) .
Proof. 
  • Put y = a n t i ( x ) in (4) to get x a n t i ( x ) a n t i ( x ) = a n t i ( x )
    n e u t ( x ) a n t i ( x ) = a n t i ( x )
    Put y = a n t i ( x ) in (3) to get a n t i ( x ) a n t i ( x ) x = a n t i ( x )
    a n t i ( x ) n e u t ( x ) = a n t i ( x )
    By (10) and (11), we have n e u t ( x ) = n e u t ( a n t i ( x ) ) . By this, a n t i ( x ) x = x a n t i ( x ) = n e u t ( x ) a n t i ( a n t i ( x ) ) = x and J 2 = I .
  • These are just (3) and (4) put in translation forms.
  • From 2., L x R a n t i ( x ) R x L a n t i ( x ) = I . So, R a n t i ( x ) R x = I L x R a n t i ( x ) y a n t i ( x ) x = y a n t i ( x ) x y = y y a n t i ( a n t i ( x ) ) a n t i ( x ) = y a n t i ( x ) x y = y y x a n t i ( x ) = y a n t i ( x ) x y = y X has the RIP, which implies that X has the LIP. Similarly, since by 2., R x L a n t i ( x ) L x R a n t i ( x ) = I , then we get X has the LIP implies X has the RIP.
  • Let x X . Recall that x n e u t ( x ) = x = n e u t ( x ) x . So, by the RCIP, n e u t ( x ) x a n t i ( n e u t ( x ) ) = x a n t i ( n e u t ( x ) )
    x a n t i ( n e u t ( x ) ) = x .
    Similarly, by the LCIP,
    a n t i ( n e u t ( x ) ) x = x .
    Thus, by (12) and (13), n e u t ( x ) = a n t i ( n e u t ( x ) ) . Furthermore, n e u t ( x ) n e u t ( x ) = a n t i ( n e u t ( x ) ) n e u t ( x ) = n e u t ( x ) a n t i ( n e u t ( x ) ) n e u t ( n e u t ( x ) ) = n e u t ( x ) n e u t ( x ) .
 ☐
Lemma 2.
Let X be a CIPNTL or an IPLNTL. Then:
1.
Equations a x = b and y c = d have solutions for x , y X and these solutions are unique for all a , b , c , d X . (unique solvability)
2.
The cancellation laws hold.
3.
The right and left translation maps R a and L a are bijections for all a X .
Proof. 
For CIPNTL.
(1)
a x = b ( a x ) a n t i ( a ) = b a n t i ( a ) x = b a n t i ( a ) X . Similarly, y c = d a n t i ( c ) ( y c ) = a n t i ( c ) d y = a n t i ( c ) d .
Let x 1 , x 2 X such that a x 1 = b = a x 2 ( a x 1 ) a n t i ( a ) = ( a x 2 ) a n t i ( a ) x 1 = x 2 .
(2)
This follows from 1.
(3)
R a : X X given by x R a = x a . R a is a bijection if and only if the equation x a = b is uniquely solvable for x for all a , b X . L a : X X given by x L a = a x . L a is a bijection if and only if the equation a x = b is uniquely solvable for x for all a , b X .
For IPNTL.
  • a x = b a n t i ( a ) ( a x ) = a n t i ( a ) b x = a n t i ( a ) b X . Similarly, y c = d ( y c ) a n t i ( c ) = d a n t i ( c ) y = d a n t i ( c ) .
    Let x 1 , x 2 X such that a x 1 = b = a x 2 a n t i ( a ) ( a x 1 ) = a n t i ( a ) ( a x 2 ) x 1 = x 2 .
  • This follows from above.
  • R a : X X given by x R a = x a . R a is a bijection if and only if the equation x a = b is uniquely solvable for x for all a , b X . L a : X X given by x L a = a x . L a is a bijection if and only if the equation a x = b is uniquely solvable for x for all a , b X .
 ☐
Theorem 2.
Let X be an NTL.
1.
X is an RCIPNTL if and only if x y a n t i ( x ) = y .
2.
X is an LCIPNTL if and only if a n t i ( x ) y x = y .
3.
X is a CIPNTL if and only if x y a n t i ( x ) = y = a n t i ( x ) y x .
Proof. 
  • By Lemma 2, if X is an RCIPNTL, then it is a left quasigroup and L a is a bijection for a X .
    Consider an NTL which has the property x y a n t i ( x ) = y . Put y = n e u t ( a n t i ( x ) ) to get x n e u t ( a n t i ( x ) ) a n t i ( x ) = n e u t ( a n t i ( x ) ) x a n t i ( x ) = n e u t ( a n t i ( x ) ) n e u t ( x ) = n e u t ( a n t i ( x ) ) a n t i ( a n t i ( x ) ) = x . Thus, x a = b x a n t i ( a n t i ( a ) ) = b a n t i ( a ) ( x a n t i ( a n t i ( a ) ) ) = a n t i ( a ) b x = a n t i ( a ) b . Let x 1 , x 2 X . Then, x 1 a = x 2 a x 1 a n t i ( a n t i ( a ) ) = x 2 a n t i ( a n t i ( a ) ) a n t i ( a ) x 1 a n t i ( a n t i ( a ) ) = a n t i ( a ) x 2 a n t i ( a n t i ( a ) ) x 1 = x 2 . So, x a = b is uniquely solvable for x that R a is bijective.
    RCIP implies L x R a n t i ( x ) = I R a n t i ( x ) = L x 1 R a n t i ( x ) L x = I x y a n t i ( x ) = y . Conversely, x y a n t i ( x ) = y R a n t i ( x ) L x = I L x = R a n t i ( x ) 1 L x R a n t i ( x ) = I RCIP.
  • By Lemma 2, if X is an LCIPNTL, then it is a right quasigroup and R a is a bijection for a X .
    Consider an NTL which has the property a n t i ( x ) y x = y . Put y = n e u t ( a n t i ( x ) ) to get a n t i ( x ) n e u t ( a n t i ( x ) ) x = n e u t ( a n t i ( x ) ) a n t i ( x ) x = n e u t ( a n t i ( x ) ) n e u t ( x ) = n e u t ( a n t i ( x ) ) a n t i ( a n t i ( x ) ) = x . Thus, a x = b a n t i ( a n t i ( a ) ) x = b ( a n t i ( a n t i ( a ) ) x ) a n t i ( a ) = b a n t i ( a ) x = b a n t i ( a ) . Let x 1 , x 2 X . Then, a x 1 = a x 2 a n t i ( a n t i ( a ) ) x 1 = a n t i ( a n t i ( a ) ) x 2 a n t i ( a n t i ( a ) ) x 1 a n t i ( a ) = a n t i ( a n t i ( a ) ) x 2 a n t i ( a ) x 1 = x 2 . So, a x = b is uniquely solvable for x that L a is bijective.
    LCIP implies R x L a n t i ( x ) = I R x 1 = L a n t i ( x ) L a n t i ( x ) R x = I a n t i ( x ) y x = y . Conversely, a n t i ( x ) y x = y L a n t i ( x ) R x = I L a n t i ( x ) 1 = R x R x L a n t i ( x ) = I LCIP.
  • This follows from 1. and 2.
 ☐
Lemma 3.
Let X be an IPNL. Then:
1.
n e u t ( x ) = n e u t ( a n t i ( x ) ) , a n t i ( a n t i ( x ) ) = x and J 2 = I .
2.
R x R a n t i ( x ) = I = L x L a n t i ( x ) .
3.
X is an RCIPNL if and only X is an LCIPNL.
4.
n e u t ( x ) = a n t i ( n e u t ( x ) ) and n e u t ( n e u t ( x ) ) = n e u t ( x ) n e u t ( x ) .
Proof. 
  • Put y = a n t i ( x ) in (1) to get a n t i ( x ) x a n t i ( x ) = a n t i ( x )
    n e u t ( x ) a n t i ( x ) = a n t i ( x )
    Put y = a n t i ( x ) in (2) to get a n t i ( x ) x a n t i ( x ) = a n t i ( x )
    a n t i ( x ) n e u t ( x ) = a n t i ( x )
    By (14) and (15), we have n e u t ( x ) = n e u t ( a n t i ( x ) ) . By this, a n t i ( x ) x = x a n t i ( x ) = n e u t ( x ) a n t i ( a n t i ( x ) ) = x and J 2 = I .
  • These are just (1) and (2) put in translation forms.
  • Keep Theorem 2 in mind. From 2., R x R a n t i ( x ) L x L a n t i ( x ) = I . So, R a n t i ( x ) L x = I R x L a n t i ( x ) x y a n t i ( x ) = y a n t i ( x ) y x = y X has the RCIP implies X has the LCIP. Similarly, since by 2., L x L a n t i ( x ) R x R a n t i ( x ) = I , then we get X has the LCIP implies X has the RCIP.
  • Let x X . Recall that x n e u t ( x ) = x = n e u t ( x ) x . So, by the RIP, x n e u t ( x ) a n t i ( n e u t ( x ) ) = x a n t i ( n e u t ( x ) )
    x a n t i ( n e u t ( x ) ) = x .
    Similarly, by the LIP,
    a n t i ( n e u t ( x ) ) x = x .
    Thus, by (16) and (17), n e u t ( x ) = a n t i ( n e u t ( x ) ) . Furthermore, n e u t ( x ) n e u t ( x ) = a n t i ( n e u t ( x ) ) n e u t ( x ) = n e u t ( x ) a n t i ( n e u t ( x ) ) n e u t ( n e u t ( x ) ) = n e u t ( x ) n e u t ( x ) .
 ☐
Theorem 3.
Let X be a CIPNTL. For all x , y X ,
1.
x , x , a n t i ( x ) = n e u t ( x ) = x , x , a n t i ( x ) .
2.
x , y , a n t i ( x ) = n e u t ( y ) = x , y , a n t i ( x ) .
3.
a n t i ( x ) , x , x = n e u t ( x ) = a n t i ( x ) , x , x .
4.
a n t i ( x ) , y , x = n e u t ( y ) = a n t i ( x ) , y , x .
5.
x , n e u t ( x ) = n e u t ( x ) = x , n e u t ( x ) .
6.
n e u t ( x ) , x = n e u t ( x ) = n e u t ( x ) , x .
7.
( x , x ) = n e u t ( x x ) = [ x , x ] .
8.
x , a n t i ( x ) = n e u t ( n e u t ( x ) ) = x , a n t i ( x ) .
9.
a n t i ( x ) , x = n e u t ( n e u t ( x ) ) = a n t i ( x ) , x .
10.
( x , y ) = ( x y ) a n t i ( y x ) and [ x , y ] = a n t i ( y x ) ( x y ) .
11.
X is commutative if and only if ( x , y ) = n e u t ( y x ) if and only if [ x , y ] = n e u t ( y x ) .
12.
If X is commutative, then X is normal if and only if ( x , y ) = ( x , n e u t ( x ) ) ( y , n e u t ( y ) ) if and only if [ x , y ] = [ x , n e u t ( x ) ] [ y , n e u t ( y ) ] .
13.
X is normal if and only if ( x , y ) a n t i ( x y ) ( y x ) = n e u t ( y ) n e u t ( x ) if and only if ( y x ) ( x , y ) a n t i ( x y ) = n e u t ( y ) n e u t ( x ) if and only if a n t i ( x y ) [ x , y ] y x = n e u t ( y ) n e u t ( x ) if and only if ( y x ) a n t i ( x y ) [ x , y ] = n e u t ( y ) n e u t ( x ) .
14.
x , n e u t ( x ) , a n t i ( x ) = n e u t ( n e u t ( x ) ) = a n t i ( x ) , n e u t ( x ) , x .
15.
n e u t ( x ) , x , a n t i ( x ) = a n t i ( x ) , x , n e u t ( x ) = x , a n t i ( x ) , n e u t ( x ) = n e u t ( x ) , a n t i ( x ) , x = n e u t ( x ) .
Proof. 
1 and 2
From the right associator, x y a n t i ( x ) = x y a n t i ( x ) x , y , a n t i ( x ) y = y x , y , a n t i ( x ) y a n t i ( y ) = y x , y , a n t i ( x ) a n t i ( y ) x , y , a n t i ( x ) = n e u t ( y ) . Hence, x , x , a n t i ( x ) = n e u t ( x ) .
From the left associator, x y a n t i ( x ) = x , y , a n t i ( x ) x y a n t i ( x ) y = x , y , a n t i ( x ) y a n t i ( y ) y = a n t i ( y ) x , y , a n t i ( x ) y x , y , a n t i ( x ) = n e u t ( y ) . Hence, x , x , a n t i ( x ) = n e u t ( x ) .
3 and 4
From the right associator, a n t i ( x ) y x = a n t i ( x ) y x a n t i ( x ) , y , x y = y a n t i ( x ) , y , x y a n t i ( y ) = y a n t i ( x ) , y , x a n t i ( y ) a n t i ( x ) , y , x = n e u t ( y ) . Hence, a n t i ( x ) , x , x = n e u t ( x ) .
From the left associator, a n t i ( x ) y x = a n t i ( x ) , y , x a n t i ( x ) y x y = a n t i ( x ) , y , x y a n t i ( y ) y = a n t i ( y ) a n t i ( x ) , y , x y a n t i ( x ) , y , x = n e u t ( y ) . Hence, a n t i ( x ) , x , x = n e u t ( x ) .
5 and 6
From the right commutator, x n e u t ( x ) = ( n e u t ( x ) x ) ( x , n e u t ( x ) ) x = x ( x , n e u t ( x ) ) x a n t i ( x ) = x ( x , n e u t ( x ) ) a n t i ( x ) x , n e u t ( x ) = n e u t ( x ) . Similarly, n e u t ( x ) , x = n e u t ( x ) .
From the left commutator, x n e u t ( x ) = [ x , n e u t ( x ) ] ( n e u t ( x ) x ) x = [ x , n e u t ( x ) ] x a n t i ( x ) x = a n t i ( x ) x ( x , n e u t ( x ) ) x , n e u t ( x ) = n e u t ( x ) . Similarly, n e u t ( x ) , x = n e u t ( x ) .
7 
From the right commutator, x x = ( x x ) ( x , x ) x x a n t i ( x x ) = ( x x ) ( x , x ) a n t i ( x x ) n e u t ( x x ) = ( x , x ) . From the left commutator, x x = [ x , x ] ( x x ) a n t i ( x x ) x x = a n t i ( x x ) [ x , x ] ( x x ) n e u t ( x x ) = [ x , x ] .
8 and 9
From the right commutator, x a n t i ( x ) = ( a n t i ( x ) x ) ( x , a n t i ( x ) ) n e u t ( x ) = n e u t ( x ) ( x , a n t i ( x ) ) n e u t ( x ) a n t i ( n e u t ( x ) ) = n e u t ( x ) ( x , a n t i ( x ) ) a n t i ( n e u t ( x ) ) b i g ( x , a n t i ( x ) ) = n e u t ( n e u t ( x ) ) . Similarly, a n t i ( x ) , x = n e u t ( n e u t ( x ) ) .
From the left commutator, a n t i ( x ) x = [ x , a n t i ( x ) ] ( x a n t i ( x ) ) n e u t ( x ) = [ x , a n t i ( x ) ] n e u t ( x ) a n t i ( n e u t ( x ) ) n e u t ( x ) = a n t i ( n e u t ( x ) ) [ x , a n t i ( x ) ] n e u t ( x ) [ x , a n t i ( x ) ] = n e u t ( n e u t ( x ) ) . Similarly, a n t i ( x ) , x = n e u t ( n e u t ( x ) ) .
10 
From the right commutator, x y = y x ( x , y ) x y a n t i ( y x ) = ( y x ) ( x , y ) a n t i ( y x ) ( x , y ) = ( x y ) a n t i ( y x ) . From the left commutator, x y = [ x , y ] y x a n t i ( y x ) x y = a n t i ( y x ) [ x , y ] ( y x ) [ x , y ] = a n t i ( y x ) ( x y ) .
11 
This follows from 10.
12 
This follows from 6 and 10.
13 
We shall use 10.
X is normal if and only if ( x , y ) a n t i ( x y ) = ( x y ) a n t i ( y x ) a n t i ( y x ) ( x , y ) a n t i ( x y ) = a n t i ( y x )
( x , y ) a n t i ( x y ) ( y x ) = a n t i ( y x ) ( y x ) or ( y x ) ( x , y ) a n t i ( x y ) = ( y x ) a n t i ( y x ) ( x , y ) a n t i ( x y ) ( y x ) = n e u t ( y x ) or ( y x ) ( x , y ) a n t i ( x y ) = n e u t ( y x ) ( x , y ) a n t i ( x y ) ( y x ) = n e u t ( y ) n e u t ( x ) or ( y x ) ( x , y ) a n t i ( x y ) = n e u t ( y ) n e u t ( x ) .
X is normal if and only if a n t i ( x y ) [ x , y ] = a n t i ( x y ) a n t i ( y x ) ( x y ) a n t i ( x y ) [ x , y ] = a n t i ( y x )
a n t i ( x y ) [ x , y ] ( y x ) = a n t i ( y x ) ( y x ) or ( y x ) a n t i ( x y ) [ x , y ] = ( y x ) a n t i ( y x ) a n t i ( x y ) [ x , y ] ( y x ) = n e u t ( y x ) or ( y x ) a n t i ( x y ) [ x , y ] = n e u t ( y x ) a n t i ( x y ) [ x , y ] ( y x ) = n e u t ( y ) n e u t ( x ) or ( y x ) a n t i ( x y ) [ x , y ] = n e u t ( y ) n e u t ( x ) .
14 
Apply the right and left associators.
15 
Apply the right and left associators.
 ☐
Lemma 4.
Let X be an NTL.
1.
Let X be an RIPNL. X is a CIPNTL if and only if X is commutative.
2.
Let X be an LIPNL. X is a CIPNTL if and only if X is commutative.
3.
Let X be commutative. The following are equivalent:
(a) 
RIP.
(b) 
LIP.
(c) 
RCIP.
(d) 
LCIP.
Proof. 
  • Let X be an RIPNL. Then, y x a n t i ( x ) = y . RCIP implies x y a n t i ( x ) = y x y a n t i ( x ) = y x a n t i ( x ) x y = y x . Conversely, RIP and commutativity imply x y a n t i ( x ) = y and a n t i ( x ) y x = y imply RCIP and LCIP.
  • Let X be an LIPNL. Then, a n t i ( x ) x y = y . LCIP implies a n t i ( x ) y x = y a n t i ( x ) y x = a n t i ( x ) x y = y x y = y x . Conversely, LIP and commutativity imply x y a n t i ( x ) = y and a n t i ( x ) y x = y imply RCIP and LCIP.
  • This follows from 1 and 2.
  • Let X be commutative. X has the RIP iff y x a n t i ( x ) = y a n t i ( x ) x y = y iff X has the LIP. X has the RIP iff y x a n t i ( x ) = y x y a n t i ( x ) = y iff X has the RCIP. X has the RIP iff y x a n t i ( x ) = y a n t i ( x ) y x = y iff X has the LCIP.
 ☐
Theorem 4.
Let X be an IPNTL. For all x , y X ,
1.
x , y , a n t i ( y ) = a n t i x n e u t ( y ) x , x , x , a n t i ( x ) = n e u t ( x ) .
2.
a n t i ( y ) , y , x = a n t i ( x ) n e u t ( y ) x , a n t i ( x ) , x , x = n e u t ( x ) .
3.
x , y , a n t i ( y ) = x a n t i x n e u t ( y ) , x , x , a n t i ( x ) = n e u t ( x ) .
4.
a n t i ( y ) , y , x = n e u t ( y ) , a n t i ( x ) , x , x = n e u t ( x ) .
5.
( x , y ) = a n t i ( y x ) ( x y ) and [ x , y ] = ( x y ) a n t i ( y x ) .
6.
x , y , a n t i ( y ) = x , y , a n t i ( y ) x a n t i ( n e u t ( y ) ) a n t i ( x ) = a n t i ( n e u t ( y ) ) .
7.
a n t i ( y ) , y , x = a n t i ( y ) , y , x x n e u t ( y ) = n e u t ( y ) x .
8.
a n t i x a n t i ( y ) , y , x x = x , y , a n t i ( y ) .
9.
a n t i ( x ) a n t i ( y ) , y , x x = a n t i ( y ) , y , x .
10.
x a n t i x a n t i ( y ) , y , x x = x , y , a n t i ( y ) .
11.
n e u t ( x ) , x = n e u t ( x ) = n e u t ( x ) , x and ( x , x ) = n e u t ( x x ) = [ x , x ] .
12.
x , n e u t ( x ) , a n t i ( x ) = n e u t ( n e u t ( x ) ) = a n t i ( x ) , n e u t ( x ) , x .
13.
n e u t ( x ) , x , a n t i ( x ) = a n t i ( x ) , x , n e u t ( x ) = x , a n t i ( x ) , n e u t ( x ) = n e u t ( x ) , a n t i ( x ) , x = n e u t ( x ) .
Proof. 
  • From the right associator, x y a n t i ( y ) = ( x y a n t i ( y ) ) x , y , a n t i ( y ) x = x n e u t ( y ) x , y , a n t i ( y ) a n t i x n e u t ( y ) x = a n t i x n e u t ( y ) x n e u t ( y ) x , y , a n t i ( y ) x , y , a n t i ( y ) = a n t i x n e u t ( y ) x . Hence, x , x , a n t i ( x ) = n e u t ( x ) .
  • From the right associator, a n t i ( y ) y x = ( a n t i ( y ) y x ) a n t i ( y ) , y , x n e u t ( y ) x = x a n t i ( y ) , y , x a n t i ( x ) n e u t ( y ) x = a n t i ( x ) x a n t i ( y ) , y , x a n t i ( y ) , y , x = a n t i ( x ) n e u t ( y ) x . Hence, a n t i ( x ) , x , x = n e u t ( x ) .
  • From the left associator, x y a n t i ( y ) = x , y , a n t i ( y ) ( x y a n t i ( y ) ) x = x , y , a n t i ( y ) ( x n e u t ( y ) ) x a n t i x n e u t ( y ) = x , y , a n t i ( y ) ( x n e u t ( y ) ) a n t i x n e u t ( y ) x , y , a n t i ( y ) = x a n t i x n e u t ( y ) . Hence, x , x , a n t i ( x ) = n e u t ( x ) .
  • From the left associator, a n t i ( y ) y x = a n t i ( y ) , y , x ( a n t i ( y ) y x ) n e u t ( y ) x = a n t i ( y ) , y , x x L e m m a 2 a n t i ( y ) , y , x = n e u t ( y ) . Hence, a n t i ( x ) , x , x = n e u t ( x ) .
  • From the right commutator, x y = ( y x ) ( x , y ) a n t i ( y x ) x y = a n t i ( y x ) ( y x ) ( x , y ) ( x , y ) = a n t i ( y x ) ( x y ) . From the left commutator, x y = [ x , y ] ( y x ) x y a n t i ( y x ) = [ x , y ] ( y x ) a n t i ( y x ) [ x , y ] = ( x y ) a n t i ( y x ) .
  • By 1 and 3, x , y , a n t i ( y ) = x , y , a n t i ( y ) a n t i x n e u t ( y ) x = x a n t i x n e u t ( y ) T h e o r e m 5 A A I P a n t i ( n e u t ( y ) ) a n t i ( x ) x = x a n t i ( n e u t ( y ) ) a n t i ( x ) a n t i ( n e u t ( y ) ) = x a n t i ( n e u t ( y ) ) a n t i ( x ) .
  • By 2 and 4, a n t i ( y ) , y , x = a n t i ( y ) , y , x a n t i ( x ) n e u t ( y ) x = n e u t ( y ) x a n t i ( x ) n e u t ( y ) x = x n e u t ( y ) x n e u t ( y ) = n e u t ( y ) x .
  • This follows combining by 1 and 4.
  • This follows combining by 2 and 4.
  • This follows combining by 3 and 4.
  • Apply 5.
  • Apply the right and left associators.
  • Apply the right and left associators.
 ☐
Lemma 5.
Let X be a CIPNTL or an IPLNTL. Then:
1.
n e u t ( x ) is unique for each x X .
2.
a n t i ( x ) is unique for each x X .
3.
X is a generalized loop and a quasigroup.
4.
X is a loop if and only if n e u t ( x ) = n e u t ( y ) for all x , y X .
5.
If X is associative, then X is a loop and group.
6.
X is a group if and only if X is associative.
Proof. 
  • By Lemma 2(2), n e u t ( x ) x = x = n e u t ( x ) n e u t ( x ) = n e u t ( x ) .
  • By Lemma 2(2), a n t i ( x ) x = x = a n t i ( x ) a n t i ( x ) = x = a n t i ( x ) .
  • These follow by 1. and Lemma 2(1).
  • By the definition of NTL and loop, and 2.
  • An associative quasigroup is a loop and a group.
  • A loop is a group if and only it is associative.
 ☐
Theorem 5.
Let X be an NTL.
1.
If X is an IPNTL, then for all x X :
(a) 
X is an AAIPNL.
(b) 
R x 1 = R a n t i ( x ) and L x 1 = L a n t i ( x ) .
(c) 
J R x J = L x 1 and J L x J = R x 1 .
(d) 
X is a WIPNTL.
2.
If X is a CIPNTL, then for all x X :
(a) 
X is an AIPNTL.
(b) 
L x R a n t i ( x ) = I = R a n t i ( x ) L x and R x L a n t i ( x ) = I = L a n t i ( x ) R x .
(c) 
J R x J = R a n t i ( x ) and J L x J = L a n t i ( x ) .
(d) 
X is a WIPNTL.
3.
If X is an RCIPNTL, then for all x X :
(a) 
X is an AIPNTL.
(b) 
L x R a n t i ( x ) = I = R a n t i ( x ) L x .
(c) 
J R x J = R a n t i ( x ) and J L x J = L a n t i ( x ) if and only if a n t i a n t i ( x ) = x .
(d) 
X is an RWIPNTL.
4.
If X is an LCIPNTL, then for all x X :
(a) 
X is an AIPNL.
(b) 
R x L a n t i ( x ) = I = L a n t i ( x ) R x .
(c) 
J R x J = R a n t i ( x ) and J L x J = L a n t i ( x ) if and only if a n t i a n t i ( x ) = x .
(d) 
X is an LWIPNTL.
Proof. 
  • Let X be an IPNTL.
    (a)
    x y = z x = z a n t i ( y ) a n t i ( y ) = a n t i ( z ) x a n t i ( z ) = a n t i ( y ) a n t i ( x ) a n t i ( y ) a n t i ( x ) = a n t i ( x y ) AAIP. So, X is an AAIPNL.
    (b)
    RIP implies x y a n t i ( y ) = x R y R a n t i ( y ) = I R y 1 = R a n t i ( y ) . LIP implies a n t i ( y ) y x = x L y L a n t i ( y ) = I L y 1 = L a n t i ( y ) .
    (c)
    y J R x J = a n t i a n t i ( y ) x = a n t i ( x ) a n t i a n t i ( y ) = a n t i ( x ) y = y L a n t i ( x ) = y L x 1 J R x J = L x 1 . Also, y J L x J = a n t i x a n t i ( y ) = a n t i a n t i ( y ) a n t i ( x ) = y a n t i ( x ) = y R a n t i ( x ) = y R x 1 J L x J = R x 1 .
    (d)
    a n t i ( x y ) x = a n t i ( y ) a n t i ( x ) x = a n t i ( y ) LWIP. Also, x a n t i ( y x ) = x a n t i ( x ) a n t i ( y ) x = a n t i ( y ) RWIP. So, X is a WIPNTL.
  • Let X be a CIPNTL.
    (a)
    x y = z y = z a n t i ( x ) a n t i ( x ) = y a n t i ( z ) a n t i ( z ) = a n t i ( x ) a n t i ( y ) a n t i ( x ) a n t i ( y ) = a n t i ( x y ) AIP. So, X is an AIPNL.
    (b)
    By Theorem 2: RCIP implies that L x R a n t i ( x ) = I = R a n t i ( x ) L x and LCIP implies that R x L a n t i ( x ) = I = L a n t i ( x ) R x .
    (c)
    y J R x J = a n t i a n t i ( y ) x = a n t i a n t i ( y ) a n t i ( x ) = y a n t i ( x ) = y R a n t i ( x ) J R x J = R a n t i ( x ) . Also, y J L x J = a n t i x a n t i ( y ) = a n t i ( x ) a n t i a n t i ( y ) = a n t i ( x ) y = y L a n t i ( x ) J L x J = L a n t i ( x ) .
    (d)
    a n t i ( x y ) x = a n t i ( x ) a n t i ( y ) x = a n t i ( y ) LWIP. Also, x a n t i ( y x ) = x a n t i ( y ) a n t i ( x ) x = a n t i ( y ) RWIP. So, X is a WIPNTL.
  • Let X be an RCIPNTL.
    (a)
    x y = z y = z a n t i ( x ) a n t i ( x ) = y a n t i ( z ) a n t i ( z ) = a n t i ( x ) a n t i ( y ) a n t i ( x ) a n t i ( y ) = a n t i ( x y ) AIP. So, X is an AIPNL.
    (b)
    By Theorem 2: RCIP implies that L x R a n t i ( x ) = I = R a n t i ( x ) L x .
    (c)
    y J R x J = a n t i a n t i ( y ) x = a n t i a n t i ( y ) a n t i ( x ) . So, J R x J = R a n t i ( x ) a n t i a n t i ( y ) a n t i ( x ) = y a n t i ( x ) a n t i a n t i ( y ) = y .
    Also, y J L x J = a n t i x a n t i ( y ) = a n t i ( x ) a n t i a n t i ( y ) . So, J L x J = L a n t i ( x ) a n t i ( x ) a n t i a n t i ( y ) = a n t i ( x ) y a n t i a n t i ( y ) = y .
    (d)
    x a n t i ( y x ) = x a n t i ( y ) a n t i ( x ) = a n t i ( y ) RWIP. So, X is an RWIPNTL.
  • Let X be an LCIPNTL.
    (a)
    x y = z x = a n t i ( y ) z a n t i ( y ) = a n t i ( z ) x a n t i ( z ) = a n t i ( x ) a n t i ( y ) a n t i ( x ) a n t i ( y ) = a n t i ( x y ) AIP. So, X is an AIPNL.
    (b)
    By Theorem 2: LCIP implies that R x L a n t i ( x ) = I = L a n t i ( x ) R x .
    (c)
    y J R x J = a n t i a n t i ( y ) x = a n t i a n t i ( y ) a n t i ( x ) . So, J R x J = R a n t i ( x ) a n t i a n t i ( y ) a n t i ( x ) = y a n t i ( x ) a n t i a n t i ( y ) = y .
    Also, y J L x J = a n t i x a n t i ( y ) = a n t i ( x ) a n t i a n t i ( y ) . So, J L x J = L a n t i ( x ) a n t i ( x ) a n t i a n t i ( y ) = a n t i ( x ) y a n t i a n t i ( y ) = y .
    (d)
    a n t i ( x y ) x = a n t i ( x ) a n t i ( y ) x = a n t i ( y ) LWIP. So, X is an LWIPNTL.
 ☐
Theorem 6.
Let X be an NTL.
1.
If X is an LWIPNTL, then for all x X :
(a) 
n e u t ( x ) = a n t i n e u t ( x ) .
(b) 
n e u t n e u t ( x ) = n e u t ( x ) n e u t ( x ) .
(c) 
a n t i a n t i ( x ) = x and J 2 = I .
(d) 
n e u t ( x ) = n e u t a n t i ( x ) .
(e) 
J is a bijection.
(f) 
X is a left quasigroup.
(g) 
L x is a bijection.
2.
If X is an RWIPNTL, then for all x X :
(a) 
n e u t ( x ) = a n t i n e u t ( x ) .
(b) 
n e u t n e u t ( x ) = n e u t ( x ) n e u t ( x ) .
(c) 
a n t i a n t i ( x ) = x and J 2 = I .
(d) 
n e u t ( x ) = n e u t a n t i ( x ) .
(e) 
J is a bijection.
(f) 
X is a right quasigroup.
(g) 
R x is a bijection.
3.
The following are equivalent.
(a) 
X is an LWIPNTL and R x is bijective.
(b) 
X is an RWIPNTL and L x is bijective.
(c) 
X is an LWIPNTL and X is a right quasigroup.
(d) 
X is an RWIPNTL and X is a left quasigroup.
4.
If X is a WIPNTL, then L x 2 = I R x 2 = I .
5.
If X is an LCIPNTL, then X is a right quasigroup.
6.
If X is an RCIPNTL, then X is a left quasigroup.
Proof. 
  • Let X be an LWIPNTL, then a n t i ( x y ) x = a n t i ( y ) .
    Put y = a n t i ( x ) to get a n t i x a n t i ( x ) x = a n t i a n t i ( x )
    a n t i n e u t ( x ) x = a n t i a n t i ( x )
    Put y = n e u t ( x ) to get a n t i x n e u t ( x ) x = a n t i n e u t ( x ) x a n t i ( x ) = a n t i n e u t ( x )
    n e u t ( x ) = a n t i n e u t ( x )
    (19) implies n e u t ( x ) n e u t ( x ) = a n t i n e u t ( x ) n e u t ( x )
    n e u t ( x ) n e u t ( x ) = n e u t n e u t ( x )
    From (18) and (19), n e u t ( x ) x = a n t i a n t i ( x ) x = a n t i a n t i ( x )   and   so ,   J 2 = I
    Put x = n e u t ( y ) to get a n t i n e u t ( y ) y n e u t ( y ) = a n t i ( y )
    a n t i ( y ) n e u t ( y ) = a n t i ( y )
    Put x = a n t i ( y ) to get a n t i a n t i ( y ) y a n t i ( y ) = a n t i ( y ) a n t i n e u t ( y ) a n t i ( y ) = a n t i ( y )
    n e u t ( y ) a n t i ( y ) = a n t i ( y )
    By (21) and (22), n e u t a n t i ( y ) = n e u t ( y )
    Let J : X X x J = a n t i ( x ) . Then, x 1 J = x 2 J a n t i ( x 1 ) = a n t i ( x 2 ) a n t i a n t i ( x 1 ) = a n t i a n t i ( x 2 ) x 1 = x 2 . So, J is 1-1. For all y X , there exists x X such that x J = y because a n t i ( x ) = y a n t i a n t i ( x ) = a n t i ( y ) x = a n t i ( y ) X .
    Consider L a : X X x L a = a x . Let x 1 L a = x 2 L a a x 1 = a x 2 a n t i ( a x 1 ) = a n t i ( a x 2 ) a n t i ( a x 1 ) a = a n t i ( a x 2 ) a a n t i ( x 1 ) = a n t i ( x 2 ) a n t i a n t i ( x 1 ) = a n t i a n t i ( x 2 ) x 1 = x 2 . For all y X , there exists x X such that x L a = y because a x = y a n t i ( a x ) = a n t i ( y ) a n t i ( a x ) a = a n t i ( y ) a a n t i ( x ) = a n t i ( y ) a a n t i a n t i ( x ) = a n t i a n t i ( y ) a x = a n t i a n t i ( y ) a .
  • Let X be an RWIPNTL, then x a n t i ( y x ) = a n t i ( y ) .
    Put y = a n t i ( x ) to get x a n t i a n t i ( x ) x = a n t i a n t i ( x )
    x a n t i n e u t ( x ) = a n t i a n t i ( x ) .
    Put y = n e u t ( x ) to get x a n t i n e u t ( x ) x = a n t i n e u t ( x ) x a n t i ( x ) = a n t i n e u t ( x )
    n e u t ( x ) = a n t i n e u t ( x ) .
    (24) implies n e u t ( x ) n e u t ( x ) = a n t i n e u t ( x ) n e u t ( x )
    n e u t ( x ) n e u t ( x ) = n e u t n e u t ( x ) .
    From (23) and (24), x n e u t ( x ) = a n t i a n t i ( x ) x = a n t i a n t i ( x )   and   so ,   J 2 = I .
    Put x = n e u t ( y ) to get n e u t ( y ) a n t i y n e u t ( y ) = a n t i ( y )
    n e u t ( y ) a n t i ( y ) = a n t i ( y ) .
    Put x = a n t i ( y ) to get a n t i ( y ) a n t i y a n t i ( y ) = a n t i ( y ) a n t i ( y ) a n t i n e u t ( y ) = a n t i ( y )
    a n t i ( y ) n e u t ( y ) = a n t i ( y ) .
    By (26) and (27), n e u t a n t i ( y ) = n e u t ( y ) .
    Let J : X X x J = a n t i ( x ) . Then, x 1 J = x 2 J a n t i ( x 1 ) = a n t i ( x 2 ) a n t i a n t i ( x 1 ) = a n t i a n t i ( x 2 ) x 1 = x 2 . So, J is 1-1. For all y X , there exists x X such that x J = y because a n t i ( x ) = y a n t i a n t i ( x ) = a n t i ( y ) x = a n t i ( y ) X .
    Consider R a : X X x R a = x a . Let x 1 R a = x 2 R a x 1 a = x 2 a a n t i ( x 1 a ) = a n t i ( x 2 a ) a a n t i ( x 1 a ) = a a n t i ( x 2 a ) a n t i ( x 1 ) = a n t i ( x 2 ) a n t i a n t i ( x 1 ) = a n t i a n t i ( x 2 ) x 1 = x 2 . For all y X , there exists x X such that x R a = y because x a = y a n t i ( x a ) = a n t i ( y ) a a n t i ( x a ) = a a n t i ( y ) a n t i ( x ) = a a n t i ( y ) a n t i a n t i ( x ) = a n t i a a n t i ( y ) x = a n t i a a n t i ( y ) .
  • X is an LWIPNTL if and only if a n t i ( x y ) x = a n t i ( y ) L x J R x = J and X is an RWIPNTL if and only if x a n t i ( y x ) = a n t i ( y ) R x J L x = J .
    X is an LWIPNTL and R x is bijective if and only if ( L x J R x ) 1 = J 1 and R x is bijective if and only if R x 1 J 1 L x 1 = J 1 R x 1 J L x 1 = J R x J L x = J and L x is bijective if and only if X is an RWIPNTL and L x is bijective.
    For a groupoid X: L x is bijective for all x X if and only if X is a left quasigroup and R x is bijective for all x X if and only if X is a right quasigroup. Hence, (a) to (d) are equivalent.
  • If X is a WIPNTL, then it is both an LWIPNTL and RWIPNTL which implies that L x J R x = J and R x J L x = J . Consequently, L x J R x 2 J L x = J 2 and R x J L x 2 J R x = J 2 . Thus, L x 2 = I R x 2 = I .
  • This follows from Lemma 2.
  • This follows from Lemma 2.
 ☐
Theorem 7.
Let X be an NTL.
1.
X has the LWIP and AAIP, then X has the RIP.
2.
X has the RWIP and AAIP, then X has the LIP.
3.
X has the LWIP and AIP, then X has the RCIP.
4.
X has the RWIP and AIP, then X has the LCIP.
5.
X is an IPNTL if and only if X is a WIPNTL and an AAIPNTL.
6.
X is a CIPNTL if and only if X is a WIPNTL and an AIPNTL.
Proof. 
Let X be an NTL.
  • LWIP implies a n t i ( x y ) x = a n t i ( y ) AAIP a n t i ( y ) a n t i ( x ) x = a n t i ( y ) x a n t i ( x ) y a n t i ( y ) a n t i a n t i ( y ) a n t i a n t i ( x ) a n t i ( x ) = a n t i a n t i ( y ) y x a n t i ( x ) = y RIP.
  • RWIP implies x a n t i ( y x ) = a n t i ( y ) AAIP x a n t i ( x ) a n t i ( y ) = a n t i ( y ) x a n t i ( x ) y a n t i ( y ) a n t i ( x ) a n t i a n t i ( x ) a n t i a n t i ( y ) = a n t i a n t i ( y ) a n t i ( x ) x y = y LIP.
  • LWIP implies a n t i ( x y ) x = a n t i ( y ) AIP a n t i ( x ) a n t i ( y ) x = a n t i ( y ) x a n t i ( x ) y a n t i ( y ) a n t i ( y ) a n t i a n t i ( x ) a n t i a n t i ( y ) a n t i ( x ) = a n t i a n t i ( y ) x y a n t i ( x ) = y RCIP.
  • RWIP implies x a n t i ( y x ) = a n t i ( y ) AIP x a n t i ( y ) a n t i ( x ) = a n t i ( y ) x a n t i ( x ) y a n t i ( y ) a n t i ( x ) a n t i a n t i ( y ) a n t i a n t i ( x ) = a n t i a n t i ( y ) a n t i ( x ) y x = y LCIP.
  • This backward of the statement follows by 1 and 2, while the forward of the statement follows by 1 of Theorem 5.
  • This backward of the statement follows by 3 and 4, while the forward of the statement follows by 2 of Theorem 5.
 ☐
Lemma 6.
Let X be an NTL.
1.
If X is an AIPNTL, then
(a) 
n e u t a n t i ( x ) = a n t i n e u t ( x ) .
(b) 
a n t i n e u t ( x ) n e u t ( y ) = n e u t a n t i ( x ) n e u t a n t i ( y ) .
2.
If X is an AAIPNTL, then
(a) 
n e u t a n t i ( x ) = a n t i n e u t ( x ) .
(b) 
a n t i n e u t ( x ) n e u t ( y ) = n e u t a n t i ( y ) n e u t a n t i ( x ) .
3.
If X is an AIPNTL (AAIPNTL), then X is an AAIPNTL (AIPNTL) if and only if a n t i ( x ) a n t i ( y ) = a n t i ( y ) a n t i ( x ) .
4.
Let X be an AIPNTL (AAIPNTL), then X is an AAIPNTL (AIPNTL) if
(a) 
a n t i ( x ) , a n t i ( y ) = n e u t a n t i ( y ) a n t i ( x ) or
(b) 
a n t i ( x ) , a n t i ( y ) = n e u t a n t i ( y ) a n t i ( x ) .
Proof. 
  • Let X be an AIPNTL. Then, a n t i ( x y ) = a n t i ( x ) a n t i ( y ) .
    (a)
    Put y = n e u t ( x ) to get a n t i x n e u t ( x ) = a n t i ( x ) a n t i n e u t ( x )
    a n t i ( x ) = a n t i ( x ) a n t i n e u t ( x ) .
    Do the replacement x n e u t ( x ) and put y = x to get a n t i n e u t ( x ) x = a n t i n e u t ( x ) a n t i ( x )
    a n t i ( x ) = a n t i n e u t ( x ) a n t i ( x ) .
    Combining (28) and (29), we get n e u t a n t i ( x ) = a n t i n e u t ( x ) .
    (b)
    Do the replacements x n e u t ( x ) and y n e u t ( y ) to get
    a n t i n e u t ( x ) n e u t ( y ) = a n t i n e u t ( x ) a n t i n e u t ( y ) = n e u t a n t i ( x ) n e u t a n t i ( y ) .
  • Let X be an AAIPNTL. Then, a n t i ( x y ) = a n t i ( y ) a n t i ( x ) .
    (a)
    Put y = n e u t ( x ) to get a n t i x n e u t ( x ) = a n t i n e u t ( x ) a n t i ( x )
    a n t i ( x ) = a n t i n e u t ( x ) a n t i ( x ) .
    Do the replacement x n e u t ( x ) and put y = x to get a n t i n e u t ( x ) x = a n t i ( x ) a n t i n e u t ( x )
    a n t i ( x ) = a n t i ( x ) a n t i n e u t ( x )
    Combining (30) and (31), we get n e u t a n t i ( x ) = a n t i n e u t ( x ) .
    (b)
    Do the replacements x n e u t ( x ) and y n e u t ( y ) to get
    a n t i n e u t ( x ) n e u t ( y ) = a n t i n e u t ( y ) a n t i n e u t ( x ) = n e u t a n t i ( y ) n e u t a n t i ( x ) .
  • This follows from the AIP and AAIP.
  • This follows from the AIP and AAIP.
 ☐
Theorem 8.
Let ( Z p , + , · ) be the field of integers modulo p, where p is prime. Define ∗ on Z p as follows: x y = a x + a y for a fixed 0 , 1 a Z p . Then:
1.
( Z p , + · ) is a non-associative commutative NTL.
2.
The following are equivalent.
(a) 
( Z p , ) is a CIPNTL.
(b) 
( Z p , ) is an IPNTL.
(c) 
a 2 1 mod p .
Proof. 
  • ( Z p , ) is a groupoid by the definition of ∗.
    Commutativity 
    x y = a x + a y = a y + a x = y x . So, ( Z p , ) is commutative.
    Neutrality 
    x n e u t ( x ) = x a x + a n e u t ( x ) = x a n e u t ( x ) = x a x = ( 1 a ) x n e u t ( x ) = a 1 ( 1 a ) x . Similarly, n e u t ( x ) x = x n e u t ( x ) x = a 1 ( 1 a ) x .
    Opposite 
    x a n t i ( x ) = n e u t ( x ) a x + a a n t i ( x ) = n e u t ( x ) a x + a a n t i ( x ) = a 1 ( 1 a ) x a n t i ( x ) = a 1 ( 1 a ) x a x = a 1 [ a 1 ( 1 a ) a ] x a n t i ( x ) = [ a 2 ( 1 a ) 1 ] x . Similarly, a n t i ( x ) x = n e u t ( x ) a n t i ( x ) = [ a 2 ( 1 a ) 1 ] x . So, ( Z p , ) is a NTL. So, ( Z p , ) is an NTL.
    Non-Associativity 
    x ( y z ) = a x + a ( a y + a z ) = a x + a 2 y + a 2 z and ( x y ) z = a ( a x + a y ) + a z = a 2 x + a 2 y + a z . So, x ( y z ) ( x y ) z .
    ( Z p , ) is a non-associative commutative NTL.
  • Going by 3. of Lemma 4, it suffices to only show that ( Z p , ) is a RIPL. ( Z p , ) has the RIP if and only if ( y x ) a n t i ( x ) = y ( a y + a x ) a n t i ( x ) = y a ( a y + a x ) + a a n t i ( x ) = y a 2 y + a 2 x + a [ a 2 ( 1 a ) 1 ] x = y a 2 y + [ a 1 ( 1 a ) a + a 2 ] x = 1 y + 0 x a 2 1 mod p .
 ☐
Remark 4.
In Theorem 8, a 2 1 mod p p | a 2 1 k Z a 2 1 = p k a = p k + 1 for some k Z with a < p . Hence, with the requirements that a 2 = p k + 1 and a < p , k = p 2 , so that a = p 1 .
Example 5.
( Z p , ) where x y = ( p 1 ) ( x + y ) , for any prime p is a non-associative commutative CIPNTL and IPNTL.

3. Application to Cryptography

Keedwell [45], Keedwell and Shcherbacov [46,47,48,49], Jaiyéọlá [50,51,52,53,54,55], and Jaiyéọlá and Adéníran [56] are of great significance in the study of quasigroups and loop with the WIP, AIP, CIP, their generalizations (i.e., m-inverse loops and quasigroups, (r,s,t)-inverse quasigroups) and applications to cryptography.
Cross inverse property quasigroups have been found appropriate for cryptography because they give rise to what is called ‘cycle of inverses’ or ‘inverse cycles’ or simply ‘cycles’.
After Jaiyéọlá [57] studied the universality of Osborn loops; a class of loop which includes universal WIP loops, some of the identities established in Jaiyéọlá and Adéníran [58] were singled out and christened ‘cryptographic identities’, and their applications to cryptography have been reported in Jaiyéọlá [59,60], Jaiyéọlá and Adéníran [61].
Going by Lemma 1, Lemma 3, and Theorem 6, a CIPNTL, IPNTL, LWIPNTL, or RWIPNTL X obeys the property a n t i a n t i ( x ) = x for any x X . Additionally, by Lemma 4, a commutative NTL X with RIP or LIP or RCIP or LCIP also has the property a n t i a n t i ( x ) = x for any x X . Hence, long inverse cycles which naturally arise in CIP quasigroup will not be feasible for such NTLs. However, for an RCIPNTL, LCIPNTL, RIPNTL, or LRIPNTL X that is non-commutative, long inverse cycles will be feasible (this makes an attack on the system more difficult). Thus, such a non-commutative NTL which is not a CIPNTL, IPNTL, RWIPNTL, or RWIPNTL will be appropriate for cryptography. The procedure for applying any of them is described below.
RCIPNTL 
Assume that the message to be transmitted can be represented as a single element x X . Then, this is enciphered by pre-multiplying by another element y X so that the cipher text is y x X . At the receiving end, the cipher text is deciphered by post-multiplying by a n t i ( y ) X to get the plain text.
LCIPNTL 
Assume that the message to be transmitted can be represented as a single element x X . Then, this is enciphered by post-multiplying by another element y X so that the cipher text is x y X . At the receiving end, the cipher text is deciphered by pre-multiplying by a n t i ( y ) X to get the plain text.
RIPNTL 
Assume that the message to be transmitted can be represented as a single element x X . Then, this is enciphered by post-multiplying by another element y X so that the cipher text is x y X . At the receiving end, the cipher text is deciphered by post-multiplying by a n t i ( y ) X to get the plain text.
LIPNTL 
Assume that the message to be transmitted can be represented as a single element x X . Then, this is enciphered by pre-multiplying by another element y X so that the cipher text is y x X . At the receiving end, the cipher text is deciphered by pre-multiplying by a n t i ( y ) X to get the plain text.
Note that these four procedures can alternatively be carried out using Theorem 2.

Author Contributions

Tèmítp Gbláhàn Jaíyéọlá has introduced many properties of the neutrosophic triplet loop and he proved them. He also presented an application of the neutrosophic triplet loops into cryptography. Florentin Smarandache has co-introduced the neutrosophic triplet set and group and their properties. He defined the neutrosophic triplet loop and several of its properties.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Araujo, J.; Konieczny, J. Molaei’s Generalized Groups are Completely Simple Semigroups. Bul. Inst. Polytech. Jassy Sect. I. Mat. Mec. Teor. Fiz. 2002, 48, 1–5. [Google Scholar]
  2. Vagner, V. Generalized Groups. Dokl. Akad. Nauk SSSR 1952, 84, 1119–1122. (In Russian) [Google Scholar]
  3. Molaei, M.R. Generalized actions. In Proceedings of the First International Conference on Geometry, Integrability and Quantization, Varna, Bulgaria, 1–10 September 1999; pp. 175–180. [Google Scholar]
  4. Molaei, M.R. Generalized groups. Bull. Inst. Polit. Di. Iase Fasc. 1999, 3, 21–24. [Google Scholar]
  5. Mehrabi, M.; Molaei, M.R.; Oloomi, A. Generalized subgroups and homomorphisms. Arab J. Math. Sci. 2000, 6, 1–7. [Google Scholar]
  6. Agboola, A.A.A. Certain properties of generalized groups. Proc. Jangjeon Math. Soc. 2004, 7, 137–148. [Google Scholar]
  7. Adeniran, J.O.; Akinmoyewa, J.T.; Solarin, A.R.T.; Jaiyeola, T.G. On some algebraic properties of generalized groups. Acta Math. Acad. Paedagog. Nyhazi. 2011, 27, 23–30. [Google Scholar]
  8. Fatehi, F.; Molaei, M.R. On Completely Simple Semigroups. Acta Math. Acad. Paedagog. Nyhazi. 2012, 28, 95–102. [Google Scholar]
  9. Agboola, A.A.A. Smooth generalized groups. J. Niger. Math. Soc. 2004, 23, 6–76. [Google Scholar]
  10. Agboola, A.A.A. Smooth generalized subgroups and homomorphisms. Adv. Stud. Contemp. Math. 2004, 9, 183–193. [Google Scholar]
  11. Molaei, M.R. Topological generalized groups. Int. J. Appl. Math. 2000, 2, 1055–1060. [Google Scholar]
  12. Molaei, M.R.; Tahmoresi, A. Connected topological generalized groups. Gen. Math. 2004, 12, 13–22. [Google Scholar]
  13. Maleki, H.; Molaei, H. On the quotient space of a generalized action of a generalized group. arXiv, 2014; arXiv:1402.3408. [Google Scholar]
  14. Bruck, R.H. A Survey of Binary Systems; Springer: Berlin/Göttingen/Heidelberg, Germany, 1966. [Google Scholar]
  15. Chein, O.; Pflugfelder, H.O.; Smith, J.D.H. Quasigroups and Loops: Theory and Applications; Sigma Series in Pure Mathematics 8; Heldermann: Berlin, Germany, 1990; ISBN 3-88538-008-0. [Google Scholar]
  16. Dene, J.; Keedwell, A.D. Latin Squares and Their Applications; Elsevier/North-Holland: Amsterdam, The Netherlands, 2015; ISBN 978-0-444-63555-6. [Google Scholar]
  17. Goodaire, E.G.; Jespers, E.; Milies, C.P. Alternative Loop Rings; North-Holland Mathematics Studies 184; North-Holland: Amsterdam, The Netherlands, 1996. [Google Scholar]
  18. Jaiyéọlá, T.G. A Study of New Concepts in Smarandache Quasigroups and Loops; Books on Demand, ProQuest Information and Learning: Ann Arbor, MI, USA, 2009. [Google Scholar]
  19. Pflugfelder, H.O. Quasigroups and Loops: Introduction; Sigma Series in Pure Math. 7; Heldermann: Berlin, Germany, 1990. [Google Scholar]
  20. Vasantha Kandasamy, W.B. Smarandache Loops; Department of Mathematics, Indian Institute of Technology: Madras, India, 2002. [Google Scholar]
  21. Smarandache, F. A Unifying Field in Logics. Neutrosophy: Neutrosophic Probability, Set and Logic; American Research Press (ARP): Rehoboth, NM, USA, 2003; ISBN 1-879585-76-6. [Google Scholar]
  22. Smarandache, F. Neutrosophic set, a generalization of the intuitionistic fuzzy set. In Proceedings of the 2006 IEEE International Conference on Granular Computing, Atlanta, GA, USA, 10–12 May 2006; pp. 38–42. [Google Scholar] [CrossRef]
  23. Zadeh, L.A. Information and control. Fuzzy Sets 1965, 8, 338–353. [Google Scholar]
  24. Atanassov, A.K. Intuitionistic fuzzy sets. Fuzzy Sets Syst. 1986, 20, 87–96. [Google Scholar] [CrossRef]
  25. Liu, P.; Liu, J.; Chen, SM. Some intuitionistic fuzzy Dombi Bonferroni mean operators and their application to multi-attribute group decision making. J. Oper. Res. Soc. 2018, 69, 1–24. [Google Scholar] [CrossRef]
  26. Liu, P.; Chen, S.M. Group decision making based on Heronian aggregation operators of intuitionistic fuzzy numbers. IEEE Trans. Cybern. 2017, 47, 2514–2530. [Google Scholar] [CrossRef] [PubMed]
  27. Liu, P.; Chen, S.M. Multiattribute Group Decision Making Based on Intuitionistic 2-Tuple Linguistic Information. Inf. Sci. 2018, 430–431, 599–619. [Google Scholar] [CrossRef]
  28. Liu, P. Multiple attribute group decision making method based on interval-valued intuitionistic fuzzy power Heronian aggregation operators. Comput. Ind. Eng. 2017, 108, 199–212. [Google Scholar] [CrossRef]
  29. Liu, P.; Li, H. Interval-valued intuitionistic fuzzy power Bonferroni aggregation operators and their application to group decision making. Cognit. Comput. 2017, 9, 494–512. [Google Scholar] [CrossRef]
  30. Liu, P.; Liu, J.; Merigo, J.M. Partitioned Heronian means based on linguistic intuitionistic fuzzy numbers for dealing with multi-attribute group decision making. Appl. Soft Comput. 2018, 62, 395–422. [Google Scholar] [CrossRef]
  31. Liu, P.; Shi, L. Some Neutrosophic uncertain linguistic number Heronian mean operators and their application to multi-attribute group decision making. Neural Comput. Appl. 2017, 28, 1079–1093. [Google Scholar] [CrossRef]
  32. Liu, P.; Zhang, L.; Liu, X.; Wang, P. Multi-valued Neutrosophic number Bonferroni mean operators and their application in multiple attribute group decision making. Int. J. Inf. Technol. Decis. Mak. 2016, 15, 1181–1210. [Google Scholar] [CrossRef]
  33. Vasantha Kandasamy, W.B.; Smarandache, F. Some Neutrosophic Algebraic Structures and Neutrosophic n-Algebraic Structures; Hexis: Frontigan, France, 2006. [Google Scholar]
  34. Vasantha Kandasamy, W.B.; Smarandache, F. N-Algebraic Structures and s-n-Algebraic Structures; Hexis: Phoenix, AZ, USA, 2006. [Google Scholar]
  35. Vasantha Kandasamy, W.B.; Smarandache, F. Basic Neutrosophic Algebraic Structures and Their Applications to Fuzzy and Neutro-Sophic Models; Hexis: Frontigan, France, 2004. [Google Scholar]
  36. Smarandache, F.; Ali, M. Neutrosophic triplet group. Neural Comput. Appl. 2016. [Google Scholar] [CrossRef]
  37. Smarandache, F.; Ali, M. Neutrosophic triplet as extension of matter plasma, unmatter plasma, and antimatter plasma. In Proceedings of the 69th Annual Gaseous Electronics Conference, Bochum, Germany, 10–14 October 2016; Available online: http://meetings.aps.org/Meeting/GEC16/Session/HT6.111. (accessed on 14 March 2018).
  38. Jaiyéọlá, T.G. Some Results on Neutrosophic Triplet Group. in press.
  39. Okpako, A.E.; Asagba, P.O. A Framework for Diagnosing Confusable Diseases using Neutrosophic based Neural Network. Int. J. Comput. Appl. 2017, 167, 1–7. [Google Scholar]
  40. Sahin, M.; Kargin, A. Neutrosophic Triplet Normed Space. Open Phys. 2017, 15, 697–704. [Google Scholar] [CrossRef]
  41. Vasantha Kandasamy, W.B.; Ilanthenral, K.; Smarandache, F. Neutrosophic Triplet Groups and Their Applications to Mathematical Modelling; EuropaNova ASBL: Bruxelles, Belgium, 2017. [Google Scholar]
  42. Smarandache, F. Neutrosophic Perspectives: Triplets, Duplets, Multisets, Hybrid Operators, Modal Logic, Hedge Algebras and Applications; Pons Publishing House: Brussels, Belgium, 2017. [Google Scholar]
  43. Agboola, A.A.A.; Davvaz, B.; Smarandache, F. Neutrosophic quadruple algebraic hyperstructures. Ann. Fuzzy Math. Inform. 2017, 14, 29–42. [Google Scholar]
  44. Zhang, X.; Smarandache, F.; Liang, X. Neutrosophic Duplet Semi-Group and Cancellable Neutrosophic Triplet Groups. Symmetry 2017, 9, 275. [Google Scholar] [CrossRef]
  45. Keedwell, A.D. Crossed-inverse quasigroups with long inverse cycles and applications to cryptography Australas. J. Comb. 1999, 20, 241–250. [Google Scholar]
  46. Keedwell, A.D.; Shcherbacov, V.A. On m-inverse loops and quasigroups with a long inverse cycle. Australas. J. Comb. 2002, 26, 99–119. [Google Scholar]
  47. Keedwell, A.D.; Shcherbacov, V.A. Construction and properties of (r,s,t)-inverse quasigroups I. Discret. Math. 2003, 266, 275–291. [Google Scholar] [CrossRef]
  48. Keedwell, A.D.; Shcherbacov, V.A. Construction and properties of (r,s,t)-inverse quasigroups II. Discret. Math. 2004, 288, 61–71. [Google Scholar]
  49. Keedwell, A.D.; Shcherbacov, V.A. Quasigroups with an inverse property and generalized parastrophic identities. Quasigroups Relat. Syst. 2005, 13, 109–124. [Google Scholar]
  50. Jaíyéọlá, T.G. An holomorphic study of Smarandache automorphic and cross inverse property loops. Sci. Magna J. 2008, 4, 102–108. [Google Scholar]
  51. Jaíyéọlá, T.G. A double cryptography using the Smarandache Keedwell cross inverse quasigroup. Int. J. Math. Comb. 2008, 3, 28–33. [Google Scholar]
  52. Jaíyéọlá, T.G. Some isotopy-isomorphy conditions for m-inverse quasigroups and loops. Analele Stiintifice Univ. Ovidius Constanta Ser. Mat. 2008, 16, 57–66. [Google Scholar]
  53. Jaíyéọlá, T.G. On a pair of universal weak inverse property loops. NUMTA Bull. 2009, 3, 22–40. [Google Scholar]
  54. Jaíyéọlá, T.G. On middle universal weak and cross inverse property loops with equal length of inverse cycles. Rev. Colomb. Mat. 2010, 44, 79–89. [Google Scholar]
  55. Jaíyéọlá, T.G. On middle universal m-inverse quasigroups and their applications to cryptography. Analele Univ. Vest Timis. Ser. Mat.-Inform. 2011, 49, 69–87. [Google Scholar]
  56. Jaiyéọlá, T.G.; Adéníran, J.O. Weak inverse property loops and some isotopy-isomorphy properties. Analele Univ. Vest Timis. Ser. Mat.-Inform. 2009, 49, 69–87. [Google Scholar]
  57. Jaíyéọlá, T.G. The Study of the Universality of Osborn Loops. Ph.D. Thesis, University of Agriculture, Abeokuta, Nigeria, 2009. [Google Scholar]
  58. Jaiyéọlá, T.G.; Adéníran, J.O. New identities in universal Osborn loops. Quasigroups Relat. Syst. 2009, 17, 55–76. [Google Scholar]
  59. Jaiyéọlá, T.G. On three cryptographic identities in left universal Osborn loops. J. Discret. Math. Sci. Cryptogr. 2011, 14, 33–50. [Google Scholar] [CrossRef]
  60. Jaiyéọlá, T.G. On two cryptographic identities in universal Osborn loops. J. Discret. Math. Sci. Cryptogr. 2013, 16, 95–116. [Google Scholar] [CrossRef]
  61. Jaiyéọlá, T.G.; Adéníran, J.O. On another two cryptographic identities in universal Osborn loops. Surv. Math. Its Appl. 2010, 5, 17–34. [Google Scholar]
Figure 1. Inverse property neutrosophic triplet loop (NTL) Hasse diagrams. AAIP: antiautomorphic inverse property; AIP: automorphic inverse property; CIP: cross inverse property; LCIP: left cross inverse property; LIP: left inverse property; LWIP: left weak inverse property; RCIP: right cross inverse property; RIP: right inverse property; RWIP: right weak inverse property; SAIP: semi-automorphic inverse property; WIP: weak inverse property.
Figure 1. Inverse property neutrosophic triplet loop (NTL) Hasse diagrams. AAIP: antiautomorphic inverse property; AIP: automorphic inverse property; CIP: cross inverse property; LCIP: left cross inverse property; LIP: left inverse property; LWIP: left weak inverse property; RCIP: right cross inverse property; RIP: right inverse property; RWIP: right weak inverse property; SAIP: semi-automorphic inverse property; WIP: weak inverse property.
Algorithms 11 00032 g001

Share and Cite

MDPI and ACS Style

Jaiyeola, T.G.; Smarandache, F. Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography. Algorithms 2018, 11, 32. https://doi.org/10.3390/a11030032

AMA Style

Jaiyeola TG, Smarandache F. Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography. Algorithms. 2018; 11(3):32. https://doi.org/10.3390/a11030032

Chicago/Turabian Style

Jaiyeola, Temitope Gbolahan, and Florentin Smarandache. 2018. "Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography" Algorithms 11, no. 3: 32. https://doi.org/10.3390/a11030032

APA Style

Jaiyeola, T. G., & Smarandache, F. (2018). Inverse Properties in Neutrosophic Triplet Loop and Their Application to Cryptography. Algorithms, 11(3), 32. https://doi.org/10.3390/a11030032

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop