Mathematics as a basis for the generation of cryptographic tools
This article is the product of the research “Mathematics as a basis for the generation of cryptographic tools”, developed at the Universidad de Cundinamarca, sectional Ubaté in the year 2021.
Problem: Improve the security of code with differential calculus, plane and spatial geometry, polar coordinates, and functions; the resulting encryption should improve on the standards of current encryption systems.
Objective: Explain the algorithm’s operation with fundamental issues that use and generate a modification proposal to make the algorithm more robust when subjected to an attack by unethical hackers.
Methodology: A bibliographic review, encryption codes, history of algorithms, and operation of SHA-256 in the Ethereum platform and Bitcoin explains how it works and gives an idea of how to improve security.
Result: The algorithm’s operation is explained step by step using subject topics such as precalculus and calculus. Also, topics such as functions, truth tables, logical operators, programming functions, and a way to complicate the algorithm were proposed by applying issues of plane geometry, space, polar coordinates, ceiling function, and absolute values.
Conclusion: It is possible to assimilate the operation of SHA-256 (256-bit secure hash algorithm) and the mathematical basis for generating codes in hexadecimal, depending on the message to be encrypted. Algebraic models allow taking different points of the figures generated in the Cartesian and polar planes to use them as a means of encryption.
Originality: Explaining an algorithm widely used in encryption issues; however, according to a survey conducted, only a few understood the code that explains the mathematics, all the aspects behind its operation, and why it is so secure. In addition, the project proposes a way to improve its security.
Limitations: The algorithm used was a hyperbolic and linear function combined. In this sense, common random points between the two functions are selected for encryption, and it is not aligned with the encryption systems used in blockchains; it is a restriction for the implementation. Currently, several updates are aligned with the SHA-256 system, involving limiting the inclusion of updated models.
How to Cite
License
Copyright (c) 2024 Ingeniería Solidaria

This work is licensed under a Creative Commons Attribution 4.0 International License.
Cession of rights and ethical commitment
As the author of the article, I declare that is an original unpublished work exclusively created by me, that it has not been submitted for simultaneous evaluation by another publication and that there is no impediment of any kind for concession of the rights provided for in this contract.
In this sense, I am committed to await the result of the evaluation by the journal Ingeniería Solidaría before considering its submission to another medium; in case the response by that publication is positive, additionally, I am committed to respond for any action involving claims, plagiarism or any other kind of claim that could be made by third parties.
At the same time, as the author or co-author, I declare that I am completely in agreement with the conditions presented in this work and that I cede all patrimonial rights, in other words, regarding reproduction, public communication, distribution, dissemination, transformation, making it available and all forms of exploitation of the work using any medium or procedure, during the term of the legal protection of the work and in every country in the world, to the Universidad Cooperativa de Colombia Press.
N-ABLE, SHA-256,Algorithm Overview: ¿What is SHA-256? 2019, p.1. [Online]. Available: https://www.n-able.com/blog/sha-256-encryption
S. Sánchez. P. Domínguez y. L. Velázquez, Hashing: Técnicas y Hash para la Protección de Datos. 2011, pp. 4-5. [Online]. Available: https://www.laccei.org/LACCEI2018-Lima/student_Papers/SP96.pdf
AWS, Funciones matemáticas. Funcion MOD. 2022, p.1. [Online]. Available: https://docs.aws.amazon.com/es_es/redshift/latest/dg/r_MOD.html.
S.L. Bitcoinforme, ¿Qué es el algoritmo de minería Ethash? 2015, Agosto 4, p.1. [Online]. Available: https://academy.bit2me.com/que-es-algoritmo-de-mineria-ethash/#0e04f783a4a3503a8
S. James, Cálculo. Transcendentes tempranas. 7ª edición. Grupo Editorial Thomson Learning., 2013, pp. 10-58
L. Ron, B. Edwards, Cálculo, tomo I. décima edición, Grupo Editorial Cengage Learning., 2014, pp. 383-3891.
D. Zill, J. Dewar, Ecuaciones diferenciales con problemas con valores en la frontera, Octava Edición, España, (2013). pp. 182-189.
J. Stewart, Cálculo de una variable. Transcendentes tempranas. 7ª edición. Thomson. 2012, pp. 10-71
L. Leithold, Cálculo con Geometría Analítica. 7 edición Editorial Harla. México. 1978 pp. 2-10, 68-75.
G. Thomas, Calculus Thomas. Special Edition. México, 2018, pp. 535-545.
R. Larson, R. Hostetler, B. Edwards, Cálculo de una variable, Volumen 1. novena Edición. Mc. Graw Hill. Méjico. 2018, pp. 390-399.
C. Edwards, H. Jr.; Penney, E. David, Cálculo con Geometría Analítica. Novena edición. Prentice Hall. 2018, pp. 59-69.
T. Apóstol, Análisis matemático. Editorial Reverte: Barcelona, 1991. pp. 581-589.
P. Ruiz. Cálculo vectorial. Prentice-Hall Hispanoamericana. 2018, Pp. 44-50.
R. Jiménez, Matemáticas VI. Cálculo Integral. México: Pearson Educación, 2013, Pp. 129-133
W. Granville, Cálculo Diferencial e Integral. México: Editorial Limusa. 2018. Pp. 179-189.
J. A. Ortega, “Performance of routing and spectrum allocation (RSA) algorithms for a last generation centralized optical network (SDON)”, Revista Ingeniería Solidaria, vol. 17, no. 2, pp. 1–30, May 2021. https://doi.org/10.16925/2357-6014.2021.02.08
J. G. Ferrer Rodríguez, “System of Inductive Reasoning Based on Genetic Algorithms For The Solution Of Problems In Conditions Of Imprecise Information Part I”, Revista Ingeniería Solidaria, vol. 5, no. 9, pp. 21–26, Jan. 2010. https://doi.org/10.16925/issn.1900-3102
G. Diáz, Ethereum: historia de la plataforma de contratos inteligentes más usada. 2018, Julio 30, p.1. [Online]. Available:https://www.criptonoticias.com/tecnologia/ethereum-historia-plataforma-contratos-inteligentes-usada/
Comité Estadounidense de Estándares. El codigo ASCII. [Online]. Available: https://elcodigoascii.com.ar/
J.Minimalsm, Máquina Virtual De Ethereum (Evm). [Online]. Available: https://ethereum.org/es/developers/docs/evm/, 2022, 12 agosto, p.1
S.L. Bitcoinforme ¿Qué es un DAG? 2015, agosto 4, p.1 [Online]. Available:https://academy.bit2me.com/que-es-un-dag/
D. Rachmawati, J. Tarigan, y M. Ginting, ABC, “Un estudio comparativo de Message Digest 5 (MD5) y el algoritmo SHA256,” Journal of Physics: Serie de conferencias, vol. 978, no. 1, pp. 012116. DOI:10.1088/1742-6596/978/1/012116
X. Fan, B. Niu, Implementación basada en arquitectura multinúcleo y SIMD en SHA-256 de Blockchain. In: Xu, K., Zhu, J., Song, X., Lu, Z. (eds) Blockchain Technology and Application. CBCC 2020. Comunicaciones en Informática y Ciencias de la Información, vol 1305. Springer, Singapur. https://doi.org/10.1007/978-981-33-6478-3_4
H. Yoshida, A. Biryukov, “Análisis de una variante SHA-256. En: Preneel, B., Tavares, S. (eds) Áreas seleccionadas en criptografía,” Lecture Notes in Computer Science, vol 3897. Springer, Berlín, Heidelberg, 2016.https://doi.org/10.1007/11693383_17
W. Andrew, N. Appel, “Verification of a cryptographic primitive: SHA-256,” ACM Trans. Program. Lang. Syst. vol. 37, no. 2, pp. 31. doi: https://dx.doi.org/10.1145/2701415
R. Martino, A. Cilardo, “Designing a SHA-256 processor for blockchain-based IoT applications, Internet of Things”, vol. 11, 2020, 100254. https://doi.org/10.1016/j.iot.2020.100254. P.1
M. Padhi, R. Chaudhari, An optimized pipelined architecture of SHA-256 hash function, 2017 7th International Symposium on Embedded Computing and System Design (ISED), Durgapur, India, 2017, pp. 1-4. doi: 10.1109/ISED.2017.8303943.
I. Ahmad, A. S. Das, “Hardware implementation analysis of SHA-256 and SHA-512 algorithms on FPGAs,” Computers & Electrical Engineering, vol. 31, no. 6, pp. 345-360. doi https://doi.org/10.1016/j.commpeleceng.2005.07.001.
G. Bertoni, J. Daemen, M. Peeters, V. Aasche, The Keccak SHA-3. submission – version 3. 2017, p.1. [Online]. Available: https://keccak.team/files/Keccak-submmission-3.pdf
M. Kammoun, M. Elleuchi, M. Abid y M.S. BenSaleh, “Implementación basada en FPGA del algoritmo hash SHA-256”, Conferencia internacional IEEE 2020 sobre diseño y prueba de micro y nanosistemas integrados (DTS), 2020, pp. 1-6. doi: https://doi.org/10.1109/DTS48731.2020.9196134




