A generalized scheme for data encryption technique using a randomized matrix key

被引:6
作者
Krishna, A. V. N. [1 ]
Pandit, S. N. N. [2 ]
Babu, A. Vinaya [3 ]
机构
[1] Indur Inst Engn & Technol, CSE Dept, Siddipet, India
[2] Osmania Univ, Hyderabad, Andhra Pradesh, India
[3] JNTU, Sch Continue & Distance Learning, Hyderabad, Andhra Pradesh, India
关键词
Cryptography; probabilistic encryption; algorithm; example; mod function; basins;
D O I
10.1080/09720529.2007.10698109
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In public key encryption there is always a possibility of some information being leaked out. Because a cryptoanalyst can always encrypt random messages with a public key, he can get some information. Not a whole of information is to be gained here, but there are potential problems with allowing a crypto analyst to encrypt random messages with public key. Some information is leaked out every time to the crypto analyst, he encrypts a message. With probabilistic encryption algorithms, a crypto analyst can no longer encrypt random plain texts looking for correct cipher text. Since multiple cipher texts will be developed for one plain text, even if he decrypts the message to plain text, he does not know how far he had guessed the message correctly. There are several algorithms for encryption. The algorithm that is going to be discussed in this work is going to generate a sequence. The algorithm considers a matrix key and executes a sequence of steps, which generates this sequence. Based on the similarity of values this sequence is being divided into basins. Each basin represents one character. Each character in the plain text is replaced by a corresponding basin value. Thus the cipher text obtained becomes impossible to be broken without knowing the key.
引用
收藏
页码:73 / 81
页数:9
相关论文
共 14 条
[1]  
Baker H., 1982, CIPHER SYSTEMS
[2]  
Baldwin R. W., 1997, SPECTRUM FEB, P40
[3]   A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR [J].
BLUM, L ;
BLUM, M ;
SHUB, M .
SIAM JOURNAL ON COMPUTING, 1986, 15 (02) :364-383
[4]  
Brossard G., LECT NOTES COMPUTER, V325
[5]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[6]  
Krishna A. V. N., 2006, INT CONV P CALIBER 2
[7]  
Krishna A. V. N., 2005, INT C P CISTM 05 JUL, P24
[8]  
Maybec J. S., 1981, P 1 S COMP ASS AN MO
[9]  
Pandit S. N. N., 1963, THESIS
[10]   A NEW MATRIX CALCULUS [J].
PANDIT, SNN .
JOURNAL OF THE SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, 1961, 9 (04) :632-639