scispace - formally typeset
Proceedings ArticleDOI

RSA encryption algorithm based on torus automorphisms

Reads0
Chats0
TLDR
In this article, the authors proposed a public-key encryption algorithm based on torus automorphisms, which is secure, practical, and can be used for both encryption and digital signature.
Abstract
We propose a public-key encryption algorithm based on torus automorphisms, which is secure, practical, and can be used for both encryption and digital signature. Software implementation and properties of the algorithm are discussed in detail. We show that our algorithm is as secure as RSA algorithm. In this paper we have generalized RSA algorithm replacing powers with matrix powers, choosing the matrix to be a matrix which defines a two-torus automorphisms, an example of strongly chaotic system.

read more

Citations
More filters
Journal ArticleDOI

Chaotic block ciphers: from theory to practical algorithms

TL;DR: A chaotic Feistel cipher and a chaotic uniform cipher are proposed to examine crypto components from both dynamical-system and cryptographical points of view, thus to explore connection between these two fields.

Chaos-based Cryptography: an overview

TL;DR: It is argued that if a chaotic map f is used in cryptography, then it should be implemented as a bijection FM : D → D, where D is a finite set with cardinality M, such that, for large M, FM ‘approximates well’ the chaoticMap f .
Proceedings Article

A new security architecture for mobile communication

TL;DR: A new Security Architecture for Mobile Communication (SAMC) is proposed, which employs new authentication protocols, chooses different encryption algorithms for different requirements and implements integrity control mechanism.
Proceedings ArticleDOI

Chaos Cryptography with prescribed Entropy Production

TL;DR: The novelties of the work are summarized as follows: the possibility to design classes of chaotic torus maps with any desirable entropy production, and how to design Torus Automorphisms with integer parameters determined from the entropy production.
Proceedings Article

A new key exchange scheme based on extended Chebyshev polynomials

TL;DR: This paper extends Chebyshev polynomials from real number to finite fields to avoid the attack and presents the corresponding key exchange scheme, which is secure and practical.
References
More filters
Journal ArticleDOI

A mathematical theory of communication

TL;DR: This final installment of the paper considers the case where the signals or the messages or both are continuously variable, in contrast with the discrete nature assumed until now.
Book

The Art of Computer Programming

TL;DR: The arrangement of this invention provides a strong vibration free hold-down mechanism while avoiding a large pressure drop to the flow of coolant fluid.
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Book

Handbook of Applied Cryptography

TL;DR: A valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols.
Journal ArticleDOI

Communication theory of secrecy systems

TL;DR: A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
Related Papers (5)