Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint . 2024
License: CC BY SA
Data sources: ZENODO
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint . 2025
License: CC BY SA
Data sources: ZENODO
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint . 2024
License: CC BY SA
Data sources: ZENODO
ZENODO
Preprint . 2024
License: CC BY SA
Data sources: Datacite
ZENODO
Preprint . 2025
License: CC BY SA
Data sources: Datacite
ZENODO
Preprint . 2025
License: CC BY SA
Data sources: Datacite
ZENODO
Preprint . 2024
License: CC BY SA
Data sources: Datacite
versions View all 4 versions
addClaim

MAX (Mathematical Applied to eXcryption) - New Encryption Algorithm with Dynamic Keys Based on Derived Parameters

Authors: RUSSO, Massimo;

MAX (Mathematical Applied to eXcryption) - New Encryption Algorithm with Dynamic Keys Based on Derived Parameters

Abstract

This work introduces MAX (Mathematical Applied to eXcryption), an innovative cryptographic algorithm that rapidly generates large prime numbers from random values of hundreds of digits. The algorithm uses these prime numbers to derive secure cryptographic keys characterized by a short lifespan, enhancing security and reducing vulnerability to attacks. Key generation is based on derived parameters, such as the quantity and common prefix of the found primes, ensuring efficient encryption even in environments with high latency or unstable connections. MAX is highly adaptable: parameters such as the length of the initial value and the number of iterations can be customized based on the available computing power, allowing for the generation of larger prime numbers and enhanced security. With the advent of quantum computers, short-lived temporary keys represent a strategic advantage against future attacks. The proposed implementation is designed to easily integrate into existing systems, ensuring robustness, scalability, and resilience. Note on the Updated Version: This version of the document includes references to a new publication dedicated to the applications of the MAX algorithm in the Internet of Things (IoT). The new publication explores how MAX can be used to autonomously generate cryptographic keys on synchronized IoT devices, enhancing security and eliminating the need for key transmission. For more details, please refer to the specific work: "Application of the MAX Algorithm for Secure Autonomous Cryptographic Key Generation in the Internet of Things (IoT)," available at the following DOI: https://doi.org/10.5281/zenodo.14173672 

Keywords

DataProtection, Secure communication,, AdvancedCryptography, Cryptographic algorithm,, Quantum attack resistance, IoTInnovation, Temporary encryption keys, Dynamic key rotation, Data security,, Post-quantum cryptography,, QuantumComputing

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average