Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Preprint . 2026
License: CC BY
Data sources: ZENODO
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
ZENODO
Preprint . 2026
License: CC BY
Data sources: Datacite
versions View all 2 versions
addClaim

Axiomatic Emergence AA; The Physical Origin of Cryptography

Authors: zhou, changzheng; zhou, ziqing;

Axiomatic Emergence AA; The Physical Origin of Cryptography

Abstract

This paper starts from two fundamental principles—Information Conservation(A1) and Finite-Step Computability (A2)—to systematically derive the core concepts and protocol systems of modern cryptography. Research shows that fundamental cryptographic building blocks such as encryption, hashing, digital signatures, and security protocols are not ad hoc tools designed to counter specificthreats but are mathematical structures that inevitably arise from the universalneed to ensure controlled and verifiable transmission of information in untrustedenvironments, subject to the fundamental principles of information processing. Weprove that the boundary between computational feasibility (A2) and computational infeasibility naturally defines the foundation of cryptographic security; whilethe recoverability of information among authorized parties and its concealmentfrom unauthorized parties (as a specific form of A1) strictly constrain the mathematical properties that cryptographic transformations must satisfy. This paperfurther proposes experimental validation of the emerged cryptographic frameworkthrough side-channel attack experiments, solving competitions for computationallyhard problems, and formal verification of security protocols, thereby establishing afalsifiable bridge between the formal theory of cryptography and the physical realityof computation.

Keywords

Cryptography; Information conservation; Computability; Computational security; One-way function; Public-key cryptography; Experimental test

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average