Abstract
A novel original procedure of encryption/decryption based on the polyadic algebraic structures and on signal processing methods is proposed. First, we use signals with integer amplitudes to send information. Then, we use polyadic techniques to transfer the plaintext into series of special integers. The receiver restores the plaintext using special rules and systems of equations.
Keywords:
polyadic ring; signal processing; encryption; decryption; polyadic integer; plaintext; arity shape; polyadic structure; congruence class; representative MSC:
11H71; 11R04; 17A42; 20N15; 68P25; 94A12
1. Introduction
We propose a new approach to transfer hidden information in (continuous-time discrete-valued) signal processing (see, e.g., [,]) by considering the parameters of signals not as the ordinary integers [,], but as a special kind of integer numbers, polyadic integers, introduced in []. The polyadic integers form polyadic -rings having (or closed with respect to) m additions and n multiplications []. In this way, preservation of the property to be in the same polyadic ring after signal processing will give various restrictions on the signal parameters. The main idea is to use these restrictions (as equations) to encrypt and decrypt a series of ordinary numbers using sets of signals prepared in special ways.
2. Polyadic Rings
We first remind that the polyadic ring or -ring is a set with m-ary addition (being a m-ary group) and n-ary multiplication (being a n-ary semigroup), which are connected by the polyadic distributive law []. A polyadic ring is nonderived, if its full operations cannot be obtained as repetition of binary operations. As the simplest example of the binary ring or -ring is the set ordinary integers , the example of -ring is the set of polyadic integers []. The concrete realization of polyadic integers is the set of representatives of the conguence class (residue class) of an integer a modulo b (with both a and b fixed)
We denote a representative element by , which are polyadic intergers , because only m additions and n multiplications are possible in the nonderived case
where and are the m-ary additive group and n-ary multiplicative semigroup of the polyadic ring .
It follows from (2) and (3) that more generally, the m-admissible sum consists of summands and the n-admissible product contains elements, where is a number of m-ary additions (m-polyadic power) and is a number of n-ary multiplications (n-polyadic power). Therefore, in general
For instance, in the residue (congruence) class
we can add representatives and multiply representatives ( are polyadic powers) to retain in the same class . If, for example, we take , , then we obtain closeness of polyadic operations
Thus, we cannot add and multiply arbitrary quantities of representatives in , only the admissible ones. This means that is really the polyadic -ring .
In general, a congruence class is a polyadic ring , if the following relations hold valid []
where are called a (polyadic) shape invariants of the congruence class , e.g., for the congruence class , the shape invariants (9) and (10) are and , correspondingly.
In Table 1, the mapping
of the congruence class parameters to the polyadic ring arities (we call it the arity shape) and shape invariants is presented for their lowest values. The arity shape mapping (11) is injective and non-surjective (empty cells), and it cannot be expressed in closed form. Moreover, e.g., the congruence classes , , , , and do not correspond to any ring, while the same -ring can be described by different congruence classes , , , and .
Table 1.
The polyadic ring of the fixed residue class : the arity shape .
The polyadic arity shape (11) is the main tool in the encryption/decryption procedure, described below.
3. Polyadic Encryption/Decryption Procedure
Let us consider the initial plaintext as a series of ordinary integer numbers (any plaintext can be transformed to that by the corresponding encoding procedure)
We propose a general encryption/decryption procedure, when each of is connected with the various parameters of signal series, and the latter are transfered to the receiver, who then restores y using special rules and systems of equations known to him only.
The main idea is to examine such signals which have parameters as polyadics integers, that is, they are in the polyadic ring (1). This can be treated as a polyadic generalization of the (binary) discretization technique (in which the parameters are ordinary integers ), and so we call it the polyadic discretization. Its crucial new feature is the possibility to transfer information (e.g., arities, minimal allowed number of additions and multiplications) using signal parameters, as it will be shown below.
Here, we apply this idea to signal amplitudes (such signals are called the continuous-time discrete-valued or quantized analog signal [,]) and their addition only. This means that we look on the additive part of the polyadic ring which is a nonderived (allowed to add exactly m terms, no fewer) m-ary group (2). In this way, we denote the single ith signal shape as
where is the amplitude of the normalized (in some manner) ith signal , t is time, and the natural corresponds to the special kind of signal (by consequent numerating sine/cosine, triangular, rectangular, etc.).
First, we assume that the amplitude is in polyadic ring, i.e., it is a representative of the congruence class , , and therefore, it has the form (1)
In this picture, for the signal species , we prepare the sum of signals as
where the total amplitude becomes different for distinct species and after usage of (14) has the general form
Thus, we observe that the total amplitude (17) of the signal (13) contains all parameters of the m-ary group (the additive part of the polyadic ring (1)). This allows us to use the combination of signals (in the above particular case sums) to transfer securely the plaintext variables (12) from sender to recepient, if we encode each of them by the polyadic ring parameters . The recepient obtains the set of the total amplitudes and treats (17) as the system of equations for parameters , and then after the decoding for each j obtains the initial plaintext (12). Schematically, we can present the proposed encryption/decryption procedure as
4. Example
Let us consider a concrete example of the proposed encryption/decryption procedure for the congruence class and one kind of signal , where ℓ is m-polyadic power. Each of such class gives (by Table 1) the arity m as the plaintext entry to transfer . Next, we should choose the shape of the function (18), which is, in general, arbitrary. In the simplest case, we take the same linear function
for all m-polyadic powers ℓ, but any functional dependence in (21) can be chosen, and it is different for different ℓ, which increases security of the procedure. The choice (21) gives
So, the total amplitudes for different polyadic powers become
The recepient obtains the set of signals with amplitudes (23) as polyadic integers
To obtain the values of three variables , one needs three equations, i.e., three total amplitudes with different arbitrary polyadic powers . Because the general solution is too cumbersome, we choose the first three consequent polyadic powers , while any three natural numbers are possible to increase the security. This gives the following system of quadratic equations
The general solution of the system is
In this particular case, for instance, the congruence class (6) has 5-ary addition, as follows from Table 1. So, if the sender wants to securely submit one element from his plainintext (12), he applies the proposed encryption procedure and prepares three sums of (quantized analog) signals (having integer amplitudes) corresponding to the polyadic powers , as follows (using (16) and (23)):
where are different (or the same) normalized signals. The recepient receives three (quantized analog) signals (31)–(33), and because he knows the normalized signals, he immediately obtains the integer values , , . Inserting them into the system of quadratic equations (known to him ahead) (25)–(27), he (directly or using (28)–(30)) derives the values , , and the desired element from the initial plaintext (12). The same procedure should be provided for each element of the plaintext (12), which completes its decryption.
5. Conclusions
Thus, we proposed a principally new encryption/decryption procedure based on exploiting the signal processing. The main idea is to consider the signal parameters as polyadic integers being representative of the fixed polyadic ring, which is treated as some kind of polyadic discretization depending on the ring integer characteristics. They allow us to transfer numerical information from sender to recepient by submitting special sets of signals with genuine properties agreed before. The recepient knows the rules and equations to solve, to decrypt the initial plaintext. Security is achieved by using a mathematical process where public information is exchanged openly, but this information is useless without a corresponding piece of private, secret information that is never transmitted.
Author Contributions
Writing—original draft, S.D.; Writing—review and editing, Q.G. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding.
Data Availability Statement
Data are contained within the article.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Oppenheim, A.V. Applications of Digital Signal Processing; Prentice-Hall: Englewood Cliffs, NJ, USA, 1978. [Google Scholar]
- Wang, B. Digital Signal Processing Techniques and Applications in Radar Image Processing; Wiley: Hoboken, NJ, USA, 2008. [Google Scholar] [CrossRef]
- Berber, S. Discrete Communication Systems; Oxford University Press: Oxford, UK, 2021. [Google Scholar] [CrossRef]
- Pedrouzo-Ulloa, A.; Troncoso-Pastoriza, J.R.; Pérez-González, F. Number theoretic transforms for secure signal processing. IEEE Trans. Inf. Forensics Secur. 2017, 12, 1125–1140. [Google Scholar] [CrossRef]
- Duplij, S. Polyadic Algebraic Structures; IOP Publishing: Bristol, UK, 2022; p. 461. [Google Scholar] [CrossRef]
- Leeson, J.J.; Butson, A.T. On the general theory of (m, n) rings. Algebra Universalis 1980, 11, 42–76. [Google Scholar] [CrossRef]
- Musayev, J.; Liscidini, A. Quantised inverter amplifier. Electron. Lett. 2018, 54, 416–418. [Google Scholar] [CrossRef]
- Karthik, A.; V, A.; Nijhawan, G.; Rana, A.; Khan, I.; Naser, Z.L. Quantum signal processing: A new frontier in information processing. In Proceedings of the 10th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON), Gautam Buddha Nagar, India, 1–3 December 2023; IEEE: New York, NY, USA, 2023; Volume 10, pp. 1527–1532. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).