NUCLEAR IDENTIFICATION OF EXTRA LOOP IDENTITIES OF SECOND BOL-MOUFANG TYPE WITH APPLICATIONS TO SECURE INFORMATION ENCODING

  • OLUFEMI GEORGE DEPARTMENT OF MATHEMATICS, UNIVERSITY OF LAGOS, AKOKA, LAGOS STATE, NIGERIA.
Keywords: extra loop, nuclear identification, Bol Moufang type loop, first Bol Moufang type loop, second Bol-Moufang type Loop

Abstract

Drpal and Jedlika identified several loop identities, including both BolMoufang and non-BolMoufang varieties through their nuclei. Among these are the extra identities. Subsequently, George and Jaiyeola developed a generalized nuclear identification scheme for identities of the second BolMoufang type. While they discovered twelve new loop identities, their approach did not establish a nuclear identification for the extra identities. This left open the question of whether extra-type identities admit nuclear identification in the second BolMoufang setting. In this paper, we introduced three new loop identities (SBME, SBRE, SBLE) of second BolMoufang type. In particular, we show that an extra loop of second BolMoufang type is nuclear- identifiable if it can be expressed as autotopisms αєη(x)αcξ(x)αnχ(x)αψζ(x) and satisfies an identity (η, ξ, χ, ζ, ϵ, ω, κ, ψ) such that η = χ /= ξ /= ζ. Furthermore, we show that the newly introduced extra identities of second BolMoufang type are equivalent to the extra identities of first BolMoufang type. Beyond the algebraic characterization, we illustrate how nuclear identification codes can inspire secure information encoding schemes, where loop identities serve as human-recognizable keys for controlled access in sensitive communication environments.

References

[1] O. Chein, Moufang loops of small order. I, Trans. Amer. Math. Soc. 188 (1974), 31–51.
[2] A. Drapal, and P. Jedlicka, On loop identities that can be obtained by a nuclear identification, European Journal of Combinatorics, 31 (2010), 1907-1923.
[3] M. Dworkin, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D, 2007. https://doi.org/10.6028/NIST.SP.800-38D.
[4] F. Fenyves, Extra loops I, Publ. Math. Debrecen, 15 (1968), 235-238.
[5] F. Fenyves, Extra loops II, Publ. Math. Debrecen, 16 (1969), 187-192.
[6] O. O. George, J. O. Olaleru, J. O. Adeniran and T. G. Ja´ıy´eo. l´a On a class of power associative LCC-loops, Extracta Mathematicae, 37(2) (2022), 185-194. doi:10.17398/2605-5686.37.2.185
[7] O. O. George and T. G. Ja´ıy´eo. l´a, Nuclear identification of some new loop identities of length five, Buletinul Academiei de Stiine a Republicii Moldova. Matematica, 99(2) (2022), 39-58. https://doi.org/10.56415/basm.y2022.i2.p39
[8] O. O. George, J. O. Olaleru and J. O. Adeniran LWPC Quasigroups, International Journal of Mathematics and Statistics, 16(3) (20219), 591–599.
[9] O. O. George, On Holomorph of WIP PACC Loops, Jordan Journal of Mathematics and Statistics, 16(3) (2023), 463- 482.https://jjms.yu.edu.jo/index.php/jjms/article/view/636
[10] O. O. George, Semidirect Product of Weak Inverse Property Power Associative Conjugacy Closed Loops, Annals of Mathematics and Computer Science, Dubai. 9 (2022), 91-100.
[11] O. O. George and T. G. Ja´ıy´eo. l´a, Characterization of Buchsteiner loop with two sided inverse Preprint.
[12] O. O. George (2025), Buchsteiner and Conjugacy Closed Quasigroups of Second Bol-Moufang Type, Romai Journal, 21(2) (2025), 81-88.
[13] O. O. George and T. G. Ja´ıy´eo. l´a, (2026), Agebraic Properties and Representations of a Class of Power Associative RCC-Loops , Proyecciones Journal of Mathematics, 45(1), 121–135.
[14] T. G. Ja´ıy´eo. l´a, O. O. George, B. Osoba, and E. Ilojide, (2025), A Class of Power Associative LCC-Loops and Some Associated Total Inner Mapping Group Questions, Algebras, Groups and Geometries, 41 (1), 45–65.
[15] R. Ilemobade, O. O. George and T. G. Jaiyeola, (2023) On the universality and isotopy-isomorphy of (r; s; t)-inverse quasigroups and loops with applications to cryptography, Quasigroups and Related Systems, 31 (1), 53-64
[16] T. G. Ja´ıy´eo. l´a and O. O. George, On loops that satisfy x · (x · yx)z = (x · xy) · xz, Comment. Math. Univ. Carolin, Accepted.
[17] T. G. Ja´ıy´eo. l´a (2009), A study of new concepts in smarandache quasigroups and loops, ProQuest Information and Learning(ILQ), Ann Arbor, USA, 127pp.
[18] B. Kaliski, PKCS #5: Password-Based Cryptography Specification Version 2.0, RFC 2898, Internet Engineering Task Force (IETF), 2000. https://doi.org/10.17487/RFC2898.
[19] G. P. Nagy and P. Vojtˇechovsky´, The LOOPS Package, Computing with quasigroups and loops in GAP 3.4.1, http://www.math.du.edu/loops.
[20] The GAP Group, GAPS - Groups, Algorithms, Programming, Version 4.11.0, http://www.gap- system.org/Manuals/pkg/loops/doc/manual.pdf
[21] H. O. Pflugfelder, Quasigroups and loops: Introduction, Sigma Series in Pure Math. 7, Heldermann Verlag, Berlin, 1990.
[22] J. D. Phillips, A short basis for the variety of WIP PACC- loops, Quasigroups and Related Systems, 14 (2006), 259-271.
[23] J. M. Osborn, Loops with the weak inverse property, Pacific J. Math. 10 (1960), 295-304.
[24] J. D. Phillips and P. Vojte˜chovsky´, The varieties of quasigroups of Bol-Moufang type, J. Algebra 293 (2005), 17-33.
[25] J. D. Phillips and P. Vojte˜chovsky´, The varieties of loops of Bol-Moufang type, Algebra Universalis 54(3) (2005), 259-271.
[26] V. Shcherbacov, Elements of quasigroup theory and applications, CRC Press, Boca Raton, 2017.
Published
2026-03-09
How to Cite
GEORGE, O. (2026). NUCLEAR IDENTIFICATION OF EXTRA LOOP IDENTITIES OF SECOND BOL-MOUFANG TYPE WITH APPLICATIONS TO SECURE INFORMATION ENCODING. Unilag Journal of Mathematics and Applications, 6(1), 33 - 42. Retrieved from https://lagjma.unilag.edu.ng/article/view/2868
Section
Articles