Have a personal or library account? Click to login

Application of Amicable Numbers in Cryptographic Data Protection Methods

Open Access
|Sep 2025

Abstract

Cryptographic data protection algorithms require specific resources for proper implementation and security. Certain environments, particularly those involving Internet of Things devices, cannot provide the necessary set of measures, including processor speed, memory size, and communication bandwidth, with an acceptable response time and a limitation on battery power consumption. Unfortunately, effective and known data protection mechanisms, such as public key infrastructure, have no potential application in this case. An alternative is to develop other solutions that will ensure an appropriate level of security and will be dedicated to devices with minimal computing and communication resources. This paper proposes a new method to access the resources or to verify access rights using so-called amicable numbers as a base for the authentication mechanism. The mathematical properties of amicable numbers can form the basis for developing new algorithms that are highly needed in the IoT world and relate to fundamental data security and privacy protection issues.

DOI: https://doi.org/10.2478/cait-2025-0024 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 88 - 103
Submitted on: Apr 7, 2025
Accepted on: Jun 17, 2025
Published on: Sep 25, 2025
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2025 Tomasz Krokosz, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.