A generalized scheme for data encryption technique using a randomized matrix key

被引:6
|
作者
Krishna, A. V. N. [1 ]
Pandit, S. N. N. [2 ]
Babu, A. Vinaya [3 ]
机构
[1] Indur Inst Engn & Technol, CSE Dept, Siddipet, India
[2] Osmania Univ, Hyderabad, Andhra Pradesh, India
[3] JNTU, Sch Continue & Distance Learning, Hyderabad, Andhra Pradesh, India
关键词
Cryptography; probabilistic encryption; algorithm; example; mod function; basins;
D O I
10.1080/09720529.2007.10698109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In public key encryption there is always a possibility of some information being leaked out. Because a cryptoanalyst can always encrypt random messages with a public key, he can get some information. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. With probabilistic encryption algorithms, a crypto analyst can no longer encrypt random plain texts looking for correct cipher text. Since multiple cipher texts will be developed for one plain text, even if he decrypts the message to plain text, he does not know how far he had guessed the message correctly. There are several algorithms for encryption. The algorithm that is going to be discussed in this work is going to generate a sequence. The algorithm considers a matrix key and executes a sequence of steps, which generates this sequence. Based on the similarity of values this sequence is being divided into basins. Each basin represents one character. Each character in the plain text is replaced by a corresponding basin value. Thus the cipher text obtained becomes impossible to be broken without knowing the key.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [21] Key Assignment Scheme with Authenticated Encryption
    Kandele, Suyash
    Paul, Souradyuti
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (04) : 150 - 196
  • [22] A Hybrid-key Based Image Encryption and Authentication Scheme with the Use of Ergodic Matrix
    Zhou, Xiaoyi
    Ma, Jixin
    Du, Wencai
    Zhao, Yongzhe
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 212 - 217
  • [23] Data Encryption and Authetication Using Public Key Approach
    Nagaraj, Srinivasan
    Raju, G. S. V. P.
    Srinadth, V.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 126 - 132
  • [24] A Novel Symmetric Key Encryption Technique using Cellular Automata
    Parashar, Deepika
    Roy, Satyabrata
    Jain, Vipin
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 174 - 178
  • [25] Improving security of parallel algorithm using key encryption technique
    Sujitha, G.
    Varadharajan, M.
    Vignesh Rao, Y.
    Sridev, R.
    Sarvesh Gauthaum, M.K.
    Narayanan, Sowmy
    Swarna Raja, R.
    Mercy Shalinie, S.
    Information Technology Journal, 2013, 12 (12) : 2398 - 2404
  • [26] An image encryption scheme using generalized Arnold map and affine cipher
    Zhu, Hegui
    Zhao, Cheng
    Zhang, Xiangde
    Yang, Lianping
    OPTIK, 2014, 125 (22): : 6672 - 6677
  • [27] A Novel Image Encryption Scheme Using an Irrevocable Multimodal Biometric Key
    Suchithra, M.
    Sikha, O. K.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 256 - 264
  • [28] A Streamlined Approach of Cloud Certificate Less Authentication Scheme Using ASCII Code Data Encryption Technique
    Mohanthy, AyodhyaRam
    Gurrala, Jagadish
    COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 337 - 345
  • [29] An Efficient Implementation of Enhanced Key Generation Technique in Data Encryption Standard (DES) Algorithm using VHDL
    Chabukswar, Punam Milind
    Kumar, Manoj
    Balaramudu, P.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 917 - 921
  • [30] The Cubic Simple Matrix Encryption Scheme
    Ding, Jintai
    Petzoldt, Albrecht
    Wang, Lih-chung
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 76 - 87