Proceedings ArticleDOI
RSA encryption algorithm based on torus automorphisms
Ljupco Kocarev,M. Sterjev,P. Amato +2 more
- Vol. 4, pp 577-580
Reads0
Chats0
TLDR
In this article, the authors proposed a public-key encryption algorithm based on torus automorphisms, which is secure, practical, and can be used for both encryption and digital signature.Abstract:
We propose a public-key encryption algorithm based on torus automorphisms, which is secure, practical, and can be used for both encryption and digital signature. Software implementation and properties of the algorithm are discussed in detail. We show that our algorithm is as secure as RSA algorithm. In this paper we have generalized RSA algorithm replacing powers with matrix powers, choosing the matrix to be a matrix which defines a two-torus automorphisms, an example of strongly chaotic system.read more
Citations
More filters
Journal ArticleDOI
Chaotic block ciphers: from theory to practical algorithms
TL;DR: A chaotic Feistel cipher and a chaotic uniform cipher are proposed to examine crypto components from both dynamical-system and cryptographical points of view, thus to explore connection between these two fields.
Chaos-based Cryptography: an overview
TL;DR: It is argued that if a chaotic map f is used in cryptography, then it should be implemented as a bijection FM : D → D, where D is a finite set with cardinality M, such that, for large M, FM ‘approximates well’ the chaoticMap f .
Proceedings Article
A new security architecture for mobile communication
TL;DR: A new Security Architecture for Mobile Communication (SAMC) is proposed, which employs new authentication protocols, chooses different encryption algorithms for different requirements and implements integrity control mechanism.
Proceedings ArticleDOI
Chaos Cryptography with prescribed Entropy Production
George Makris,Ioannis Antoniou +1 more
TL;DR: The novelties of the work are summarized as follows: the possibility to design classes of chaotic torus maps with any desirable entropy production, and how to design Torus Automorphisms with integer parameters determined from the entropy production.
Proceedings Article
A new key exchange scheme based on extended Chebyshev polynomials
Wang Da-hu,Wei Xue-ye +1 more
TL;DR: This paper extends Chebyshev polynomials from real number to finite fields to avoid the attack and presents the corresponding key exchange scheme, which is secure and practical.
References
More filters
Journal ArticleDOI
A mathematical theory of communication
TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book
The Art of Computer Programming
TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI
New Directions in Cryptography
TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book
Handbook of Applied Cryptography
TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI
Communication theory of secrecy systems
TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.