A generalized scheme for data encryption technique using a randomized matrix key

被引:6
|
作者
Krishna, A. V. N. [1 ]
Pandit, S. N. N. [2 ]
Babu, A. Vinaya [3 ]
机构
[1] Indur Inst Engn & Technol, CSE Dept, Siddipet, India
[2] Osmania Univ, Hyderabad, Andhra Pradesh, India
[3] JNTU, Sch Continue & Distance Learning, Hyderabad, Andhra Pradesh, India
关键词
Cryptography; probabilistic encryption; algorithm; example; mod function; basins;
D O I
10.1080/09720529.2007.10698109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In public key encryption there is always a possibility of some information being leaked out. Because a cryptoanalyst can always encrypt random messages with a public key, he can get some information. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. With probabilistic encryption algorithms, a crypto analyst can no longer encrypt random plain texts looking for correct cipher text. Since multiple cipher texts will be developed for one plain text, even if he decrypts the message to plain text, he does not know how far he had guessed the message correctly. There are several algorithms for encryption. The algorithm that is going to be discussed in this work is going to generate a sequence. The algorithm considers a matrix key and executes a sequence of steps, which generates this sequence. Based on the similarity of values this sequence is being divided into basins. Each basin represents one character. Each character in the plain text is replaced by a corresponding basin value. Thus the cipher text obtained becomes impossible to be broken without knowing the key.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [31] A secure data deletion scheme for IoT devices through key derivation encryption and data analysis
    Xiong, Jinbo
    Chen, Lei
    Bhuiyan, Md Zakirul Alam
    Cao, Chunjie
    Wang, Minshen
    Luo, Entao
    Liu, Ximeng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 741 - 753
  • [32] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
    Nadeem, Muhammad
    Arshad, Ali
    Riaz, Saman
    Zahra, Syeda Wajiha
    Dutta, Ashit Kumar
    Al Moteri, Moteeb
    Almotairi, Sultan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 4059 - 4079
  • [33] A low redundancy data collection scheme to maximize lifetime using matrix completion technique
    Tan, Jiawei
    Liu, Wei
    Xie, Mande
    Song, Houbing
    Liu, Anfeng
    Zhao, Ming
    Zhang, Guoping
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [34] A low redundancy data collection scheme to maximize lifetime using matrix completion technique
    Jiawei Tan
    Wei Liu
    Mande Xie
    Houbing Song
    Anfeng Liu
    Ming Zhao
    Guoping Zhang
    EURASIP Journal on Wireless Communications and Networking, 2019
  • [35] PROFICIENT KEY MANAGEMENT SCHEME FOR MULTICAST GROUPS USING GROUP KEY AGREEMENT AND BROADCAST ENCRYPTION
    Abirami, E.
    Padmavathy, T.
    2017 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2017,
  • [36] Secret Sharing Scheme for Image Encryption Using New Transformation Matrix
    Selvi, A. Kalai
    Sathik, M. Mohamed
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 647 - +
  • [37] Generation of Key Matrix for Hill Cipher Encryption Using Classical Cipher
    Mani, K.
    Mahendran, R.
    2017 2ND WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT), 2017, : 51 - 54
  • [38] A new method of generating public key matrix and using it for image encryption
    Chhotaray, Sukant Kumar
    Chhotaray, Animesh
    Rath, Girija Sankar
    2ND INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN) 2015, 2015, : 453 - 458
  • [39] Quantum public key encryption scheme with four states key
    Liu, Zhixin
    Xie, Qiaoling
    Zha, Yongfu
    Dong, Yumin
    PHYSICA SCRIPTA, 2022, 97 (04)
  • [40] The key to widespread data encryption
    Moulds, Richard
    Computer Fraud and Security, 2007, 2007 (07): : 18 - 20