A generalized scheme for data encryption technique using a randomized matrix key

被引:6
|
作者
Krishna, A. V. N. [1 ]
Pandit, S. N. N. [2 ]
Babu, A. Vinaya [3 ]
机构
[1] Indur Inst Engn & Technol, CSE Dept, Siddipet, India
[2] Osmania Univ, Hyderabad, Andhra Pradesh, India
[3] JNTU, Sch Continue & Distance Learning, Hyderabad, Andhra Pradesh, India
关键词
Cryptography; probabilistic encryption; algorithm; example; mod function; basins;
D O I
10.1080/09720529.2007.10698109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In public key encryption there is always a possibility of some information being leaked out. Because a cryptoanalyst can always encrypt random messages with a public key, he can get some information. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. With probabilistic encryption algorithms, a crypto analyst can no longer encrypt random plain texts looking for correct cipher text. Since multiple cipher texts will be developed for one plain text, even if he decrypts the message to plain text, he does not know how far he had guessed the message correctly. There are several algorithms for encryption. The algorithm that is going to be discussed in this work is going to generate a sequence. The algorithm considers a matrix key and executes a sequence of steps, which generates this sequence. Based on the similarity of values this sequence is being divided into basins. Each basin represents one character. Each character in the plain text is replaced by a corresponding basin value. Thus the cipher text obtained becomes impossible to be broken without knowing the key.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [1] A Symmetrical Encryption Technique for Text Encryption Using Randomized Matrix Based Key Generation
    Mante, Pratik Gajanan
    Oswal, Harsh Rajendra
    Swain, Debabrata
    Deshpande, Deepali
    ADVANCES IN DATA SCIENCE AND MANAGEMENT, 2020, 37 : 137 - 148
  • [2] A DNA Encryption Technique Based on Matrix Manipulation and Secure key Generation Scheme
    Mandge, Tushar
    Choudhary, Vijay
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 47 - 52
  • [3] New Watermarking Technique Using Data Matrix and Encryption Keys
    Kim, Ilhwan
    Kwon, Chang-Hee
    Lee, Wangheon
    JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2012, 7 (04) : 646 - 651
  • [4] Structural Key Recovery of Simple Matrix Encryption Scheme Family
    Liu, Jinhui
    Yu, Yong
    Yang, Bo
    Jia, Jianwei
    Wang, Shijia
    Wang, Houzhen
    COMPUTER JOURNAL, 2018, 61 (12): : 1880 - 1896
  • [5] Structural key recovery of simple matrix encryption scheme family
    Yu, Yong (yuyong@snnu.edu.cn), 1880, Oxford University Press (61):
  • [6] A new hybrid watermarking technique using data matrix and encryption keys
    An, Jun-Sik
    Jeon, Seong-Goo
    Kim, Il-Hwan
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2007, : 176 - 180
  • [7] A Reversible Data Hiding through Encryption Scheme for Medical Image Transmission Using AES Encryption with Key Scrambling
    Murthy, Kandala Sree Rama
    Manikandan, V. M.
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2022, 13 (05) : 433 - 440
  • [8] An optimized encryption technique using an arbitrary matrix with probabilistic encryption
    Ratha, Paresh
    Swain, Debabala
    Paikaray, Bijay
    Sahoo, Subhadra
    3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 : 1235 - 1241
  • [9] Encryption scheme In Portable Electric Vehicle Charging Infrastructure Encryption scheme Using symmetric key
    Jang, Chan-Kuk
    Lee, JaeHoon
    Yi, Okyeon
    2017 4TH INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS AND INFORMATION PROCESSING TECHNOLOGY (CAIPT), 2017, : 392 - 396
  • [10] A Randomized Encryption Scheme
    Azzam, Jamal Abelfatah Morad
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2015, : 715 - 721