Page 16 - Abstract book - TJSSF-2020
P. 16

Thailand – Japan Student Science Fair 2020 (TJ-SSF 2020)
                              “Seeding Innovations through Fostering Thailand – Japan Youth Friendship”



                          Safety vault with security sharing algorithm using matrix


                                        Natthanan Phutthason , Patipan Nillaphant
                                                                                 1
                                                             1
                                              Advisor: Sumalee Klaimuang
                                                                          1

                                        Princess Chulabhorn Science High School Loei
                                       1



               Abstract


                       Mathematics Project on the topic of “Safety vault with security sharing algorithm using matrix”
               aims to create a safe and create a password with Security sharing system by applying knowledge of the
               matrix, the Geometer's Sketchpad (GSP) version 5.06 program and programming on the Raspberry pi
               3. It has been summarized and discussed the results as follow;
                       From the study of how to create a security system Pattern for sharing secret passwords and
               creating safes with security systems by using mathematical knowledge about matrix was found that the
               secret t out of n then t, n  I+,     and          has 5 patterns. There are a format for sharing
               the secret 2 out of n, 3 out of n, 4 out of n, 5 out of n and 6 out of n. In calculation and build a safe with
               a secret-sharing security system using the raspberry pi 3 board to control the mechanism of the safe by
               having guidelines for creating security systems. The format for sharing the secret t out of n is as follows:

               If       is password and divide the information related to the secret into n parts, then give each section
               to relevant parties. When taking any part of the confidential information t in this n part together. It will

               be able to find     . But if there is less confidential information than t, it will not be able to know
                     with the following steps.

                       Then      t    I+ and

                                     n    I+ and

                        1.  Select function                                    and if      is password then

                                                         .

                        2.  Choose n points that are on the curve that                                from

                            relevant parties then n is                           .
                        3.  Substitute at least t points to create linear equations and get a system of linear equations,
                            t equations, variables as follows:

                              From

                              From



                       From



                                                            4
   11   12   13   14   15   16   17   18   19   20   21