Abstract

In the information society, it is essential to continue developing information security technology. Recently, various approaches, such as quizzes, have been 22 taken. In the past years, we have been studying knot theory and introducing new functions implying invariants to distinguish some knots and links. One of the functions we introduced has a speci c characteristic that enables it to accomplish the purpose with surprisingly less calculation time. In this study we apply this function: the multiple linking number T to create quizzes for authentication.

Content

We are using variations of Milnors triple linking number. In essence we are defining a new invariant which is stronger than Milnors triple linking number. (Actually the f contains the information of Milnors triple linking number.)

We study two specific braids defined by simple Gauss diagrams.

Application to Authentication Technology

We prepare a knot. We apply two transformation. One adds more crossings and another cut open strings. We scramble the knot such that the knot does not look symmetrical anymore.

Actually we give 3 authentification methods