On Eulerian Transformations and Postquantum Access Control Protocol-Based Algorithms Vasyl Ustimenko1,2 and Oleksandr Pustovit2 1 University of Marie Curie-Sklodowska in Lublin, 5 Plac Marii Curie-Skłodowskiej, Lublin, 20-031, Poland 2 Institute of Telecommunications and the Global Information Space, 13 Chokolivsky bul., Kyiv, 02000, Ukraine Abstract The paper is dedicated to applications of Noncomutative Cryptography to access control algorithms for Information Systems. The example of usage of the protocol based on multivariate transformations to access control tasks is given. The platforms for such protocols are subsemigroups of affine Cremona semigroup acting on affine space of dimension n with Multicomposition property, i.e. ability to make computation of the composition of n elements from subsemigroup in polynomial time T(n).The implementation of the algorithm is given in the case of platform of Eulerian transformations. The modification of main algorithm is based on the idea of combination of Eulerian Transformations with elements of affine Cremona group of bounded degree and polynomial density. Keywords 1 Access control, noncommutative cryptography, multivariate cryptography, multicomposition property, Eulerian transformations, one-time pad. 1. Introduction Protocol based approach to control access to information systems in information space is a very popular one. With the appearance of the first samples of quantum computers it is very important to investigate potential of this approach. We study new postquantum resistant multivariate protocols which can substitute unresistable to quantum computer based attacks Diffie-Hellman algorithm. Current state of research in Postquantum Multivariate Cryptography is presented on the web page of the future Satellite Conference “Mathematical Aspects of Post Quantum Cryptography” of the Mathematical Congress 2022 (see https://icm2022.org/satellites). One of the sixth main directions of the Post Quantum Cryptography is Multivariate Cryptography for which affine Cremona semigroup named after Luigi Cremona [1] and its multivariate transformations are the main instruments to create cryptographical algorithms. These transformations are induced by endomorphisms of polynomial ring K[ x1 , x 2 ,..., x n ] over commutative ring K. The case K=Fq of finite field is very popular in classical Multivariate Cryptography. We discover large subgroups of CSn(K), n=2,3,… with the Multicomposition property (MCP) which means possibility to compute the composition of N arbitrary chosen elements of CSn(K) in polynomial time T(n). We assume that each element of CSn(K) is given in its standard polynomial form xi  f i ( x1 , x 2 ,..., x n ), i=1,2,…n. 2. On Multivariate Protocols of Noncommutative CRYPTOGRAPHY and Access Control Tahoma protocol was introduced in [2]. It uses two semigroups Sn