scispace - formally typeset
Search or ask a question

Showing papers on "Cryptography published in 1970"


Journal ArticleDOI
01 Jan 1970
TL;DR: A new paradigm for dispersion of information into three-dimensional space to generate a strenuous crypto system using quaternion rotation matrix QRM, which has capability to provide a meditative encryption system for wireless images or voice transmissions.
Abstract: This paper introduces a new paradigm for dispersion of information into three-dimensional space to generate a strenuous crypto system. The dispersion of the information is carried out by quaternion rotation matrix which is called quadripartite public-key (QPK). We considered a private key as a unit quaternion which has an arbitrary quadruple of real numbers. The public key has three different components which are constructed using quaternion rotation matrix QRM to generate a secure key, which significantly eliminates the risk of eavesdropping. Furthermore, quaternion has capability to provide a meditative encryption system for wireless images or voice transmissions. A computer-based simulation conducted to scrutinize the capability of QPK carefully in insuring the highest level of security is reported.

5 citations


02 Nov 1970
TL;DR: The problems and implications of privacy in today's computer oriented society are many and diverse and some current schemes being employed to insure the privacy and security of information are discussed.
Abstract: : The problems and implications of privacy in today's computer oriented society are many and diverse. Privacy could possibly become a non-existant commodity and the creation of large data banks containing personal information could result in 'automated blackmail'. Will the end result be a police type dossier on every citizen in the country. Some of the possible solutions both legal and technical are discussed along with some current schemes being employed to insure the privacy and security of information. Additionally, some proposals are discussed which might be used to guarantee file integrity. The application of cryptography to the security problem is also discussed.

5 citations


Journal ArticleDOI
TL;DR: A number of well-known techniques are adopted for computer usage including the Caesar, Bilinear, Homophonic, Vigenere, and Playfair method to maintain the confidentiality of computerized information flies.

4 citations


Journal ArticleDOI
TL;DR: Basic techniques that are suitable for computational cryptography, including suitable transformation techniques such as arithmetical, logic, matrix, topological, functional and hierarchical schemes are described.
Abstract: This paper is concerned with basic techniques that are suitable for computational cryptography. The difficulties involved in constructing suitable crypto-programmes as well as the criteria for the choice of crypto-programmes are discussed. The relevant mathematical properties of transformations are worked out. On this basis, suitable transformation techniques such as arithmetical, logic, matrix, topological, functional and hierarchical schemes are described. Finally, a brief discussion is given on the system design for crypto -programming.

4 citations


Journal Article
TL;DR: In this paper, a symmetric key stream cipher was proposed for color images cryptography, in which multiple one-dimensional chaotic maps are used instead of a single chaotic map for the decoding process.
Abstract: Chaotic cryptology has been widely investigated recently. A common feature in the most recent developments of chaotic cryptosystems is the use of a single dynamical map in the encoding– decoding process. The main objective of this paper is to provide a set of chaotic systems instead of a single one for cryptography. We propose a symmetric key stream cipher algorithm in which multiple one-dimensional chaotic maps are used instead of a one-dimensional chaotic map. We demonstrate that the produced key streams have good statistical properties, such as uniform distribution and very height sensitivity to initial conditions. The proposed approaches are applied for color images cryptography. Analysis of the results demonstrates the robustness of the algorithm against different cryptanalysis attacks. The proposed cryptosystem is shown to be robust against brute force attack, plain text attack and differential attacks, and can achieve a ciphering rate of 40Mb/S.

3 citations