@techreport{oai:ipsj.ixsq.nii.ac.jp:00227634, author = {Kamolphat, Intawong and Kamolphat, Intawong}, issue = {5}, month = {Aug}, note = {In the information society, it is essential to continue developing information security technology. Recently, various approaches, such as puzzles, have been taken. In the past years, we have been studying the linking number theory of topology and introducing new functions implying invariants to distinguish some knots and links. One of the functions we created has the ability to accomplish the purpose with surprisingly less calculation time. The purpose of this study is to apply this function-the multiple linking number T to create a quiz for authentication. In this paper, we introduce three types of authentication methods., In the information society, it is essential to continue developing information security technology. Recently, various approaches, such as puzzles, have been taken. In the past years, we have been studying the linking number theory of topology and introducing new functions implying invariants to distinguish some knots and links. One of the functions we created has the ability to accomplish the purpose with surprisingly less calculation time. The purpose of this study is to apply this function-the multiple linking number T to create a quiz for authentication. In this paper, we introduce three types of authentication methods.}, title = {Application of linking number theory to authentication technology}, year = {2023} }