A generalized scheme for data encryption technique using a randomized matrix key

被引:6
|
作者
Krishna, A. V. N. [1 ]
Pandit, S. N. N. [2 ]
Babu, A. Vinaya [3 ]
机构
[1] Indur Inst Engn & Technol, CSE Dept, Siddipet, India
[2] Osmania Univ, Hyderabad, Andhra Pradesh, India
[3] JNTU, Sch Continue & Distance Learning, Hyderabad, Andhra Pradesh, India
关键词
Cryptography; probabilistic encryption; algorithm; example; mod function; basins;
D O I
10.1080/09720529.2007.10698109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In public key encryption there is always a possibility of some information being leaked out. Because a cryptoanalyst can always encrypt random messages with a public key, he can get some information. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. With probabilistic encryption algorithms, a crypto analyst can no longer encrypt random plain texts looking for correct cipher text. Since multiple cipher texts will be developed for one plain text, even if he decrypts the message to plain text, he does not know how far he had guessed the message correctly. There are several algorithms for encryption. The algorithm that is going to be discussed in this work is going to generate a sequence. The algorithm considers a matrix key and executes a sequence of steps, which generates this sequence. Based on the similarity of values this sequence is being divided into basins. Each basin represents one character. Each character in the plain text is replaced by a corresponding basin value. Thus the cipher text obtained becomes impossible to be broken without knowing the key.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 50 条
  • [41] Secret Key Awareness Security Public Key Encryption Scheme
    Zhang, Guoyan
    Xu, Qiuliang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2011, 5 (04): : 49 - 57
  • [42] Data encryption technique using random number generator
    Sekhar, A. Chandra
    Sudha, K. R.
    Prasad, Reddy P. V. G. D.
    GRC: 2007 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, PROCEEDINGS, 2007, : 576 - +
  • [43] CSP-DHIES: a new public-key encryption scheme from matrix conjugation
    Pan, Ping
    Wang, Lihua
    Wang, Licheng
    Li, Lixiang
    Yang, Yixian
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 809 - 822
  • [44] Secure Forensic Data Using Blockchain and Encryption Technique
    Renuka, B. S.
    Kusuma, S.
    INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, ICIDCA 2021, 2022, 96 : 883 - 897
  • [45] A New Technique for Data Encryption using DNA Sequence
    Pushpa, B. R.
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [46] Cumulative Image Encryption Approach based on User Defined Operation, Character Repositioning, Text Key and Image Key Encryption Technique and Secret Sharing Scheme
    Das, Ramkrishna
    Manna, Sarbajit
    Dutta, Saurabh
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 748 - 753
  • [47] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    WuhanUniversityJournalofNaturalSciences, 2012, 17 (03) : 223 - 228
  • [48] A New Public-Key Encryption Scheme
    Hai-Bo Tian
    Xi Sun
    Yu-Min Wang
    Journal of Computer Science and Technology, 2007, 22 : 95 - 102
  • [49] Evolution of the McEliece Public Key Encryption Scheme
    Bucerzan, Dominic
    Dragoi, Vlad
    Kalachi, Herve Tale
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATION: 10TH INTERNATIONAL CONFERENCE, SECITC 2017, 2017, 10543 : 129 - 149
  • [50] A new public-key encryption scheme
    Tian, Hai-Bo
    Sun, Xi
    Wang, Yu-Min
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) : 95 - 102