Some results on an encryption method using subset-sums of pseudo-recursive sequences

被引:1
|
作者
Bakos, Bence [1 ]
Palfy, Mate [1 ]
机构
[1] Eotvos Lorand Univ, Inst Math, Pazmany St 1-C, H-1117 Budapest, Hungary
关键词
subset-sums; Cantor's representation of integers; encoding a codeword;
D O I
10.47443/dml.2021.0019
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Let A(eta) := {[2(n)eta] : n = 0, 1, 2, ...}, where 1 <= eta < 2. In the recent paper [Discrete Math. Lett. 4 (2020) 31-36], the authors examined the subset-sums of the set A(eta) and then presented an encryption algorithm. The basics of the latter part is that the encoded message is a public natural number N and everyone is allowed to query for the set (A(eta) + A(eta)) boolean AND [1, N] until they find an element of it. Using the results about P (A(eta)), the set of subset-sums of A(eta), it was shown that with the secret key gamma the message can be decoded in logarithmic time, but for an eavesdropper without the key it takes on average more than N/log(2)N time. In this article, we show that the eavesdropper essentially can not figure out the codeword from the found element of S, even if she got that element from the query sequence in a relatively short time.
引用
收藏
页码:63 / 67
页数:5
相关论文
共 49 条
  • [1] On subset sums of pseudo-recursive sequences
    Bakos, Bence
    Hegyvari, Norbert
    Palfy, Mate
    Yang, Xiao-Hui
    DISCRETE MATHEMATICS LETTERS, 2020, 4 : 31 - 36
  • [2] MINIMAL-PROGRAM COMPLEXITY OF PSEUDO-RECURSIVE AND PSEUDO-RANDOM SEQUENCES
    DALEY, RP
    MATHEMATICAL SYSTEMS THEORY, 1975, 9 (01): : 83 - 94
  • [3] Some new results on subset sums
    Vu, Van H.
    JOURNAL OF NUMBER THEORY, 2007, 124 (01) : 229 - 233
  • [4] A partial image encryption method with pseudo random sequences
    Rao, Y. V. Subba
    Mitra, Abhijit
    Prasanna, S. R. Mahadeva
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 315 - +
  • [5] Adaptive Encryption Using Pseudo-Noise Sequences for Medical Images
    Mahmood, Ahmed B.
    Dony, Robert D.
    2013 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND INFORMATION TECHNOLOGY (ICCIT), 2013, : 39 - 43
  • [6] SOME ASYMPTOTIC RESULTS IN RECURSIVE-IDENTIFICATION USING LAGUERRE MODELS
    GUNNARSSON, S
    WAHLBERG, B
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 1991, 5 (05) : 313 - 333
  • [7] Test Pattern Generation Using Recursive Pseudo Exhaustive Method for Wallace Tree Multiplier
    Zode, Pradnya
    Zode, Pravin
    Deshmukh, Raghavendra
    IEEE INDICON: 15TH IEEE INDIA COUNCIL INTERNATIONAL CONFERENCE, 2018,
  • [8] SOME IDENTITIES ON CONDITIONAL SEQUENCES BY USING MATRIX METHOD
    Tan, Elif
    Ekin, A. Bulent
    MISKOLC MATHEMATICAL NOTES, 2017, 18 (01) : 469 - 477
  • [9] A novel audio encryption method using Henon–Tent chaotic pseudo random number sequence
    Adhikari S.
    Karforma S.
    International Journal of Information Technology, 2021, 13 (4) : 1463 - 1471
  • [10] Simultaneous encryption of multiple images using pseudo-random sequences generated by modified Newton-Raphson technique
    Aakash Paul
    Shyamalendu Kandar
    Multimedia Tools and Applications, 2022, 81 : 14355 - 14378