使用欧拉商函数进行数据加密和解密的一些结果

Gobburi Rekha, V. Srinivas
{"title":"使用欧拉商函数进行数据加密和解密的一些结果","authors":"Gobburi Rekha, V. Srinivas","doi":"10.52783/cana.v31.1063","DOIUrl":null,"url":null,"abstract":"In this paper, we discuss about the Hill Cipher cryptosystem, the RSA public-key cryptosystem, developed by Rivest, Shamir, Adleman for text encoding and decoding. To encrypt and decrypt the message, we use the Euler Phi-function, congruences, and matrix multiplication. Further, we employ two keys for coding and decoding. \nIntroduction: In present, computer networks, internet and mobile communications are important and inevitable part of our society and security of information from hackers is a big task. One of the most widely used applications for information security is Cryptography. Usually in Hill cipher there are two keys, of which one acts as encryption key and the other one acts as decryption key.  In this paper we discuss about Hill Cipher using only one key for data encryption and data decryption. Further, we extend our result with dual encryption and decryption process which is explained by using the RSA public key cryptosystem and Hill Cipher and they together execute a powerful cryptosystem to secure the data. \nObjectives: The purpose of this paper is to obtain and compare the result of data encryption and data decryption using: \n \nA matrix which is invertible. \nA matrix which is Involutory. \nAn RSA cryptosystem which is applied for Hill Cipher where the matrix is Involutory. \n \nMethods: Using Hill Cipher and thereafter Hill Cipher - RSA together we have encrypted and decrypted the data under modulo 255. \nResults: The text message is converted to coded message and then original message is retrieved by using the three different techniques. \nConclusions: As the paper involves two stages of encryption and decryption where public key and private key which are unthinkable by the third parities, the security of information is highly appreciable.","PeriodicalId":40036,"journal":{"name":"Communications on Applied Nonlinear Analysis","volume":" 13","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Some Results of Data Encryption and Decryption using Euler’s Totient Function\",\"authors\":\"Gobburi Rekha, V. Srinivas\",\"doi\":\"10.52783/cana.v31.1063\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we discuss about the Hill Cipher cryptosystem, the RSA public-key cryptosystem, developed by Rivest, Shamir, Adleman for text encoding and decoding. To encrypt and decrypt the message, we use the Euler Phi-function, congruences, and matrix multiplication. Further, we employ two keys for coding and decoding. \\nIntroduction: In present, computer networks, internet and mobile communications are important and inevitable part of our society and security of information from hackers is a big task. One of the most widely used applications for information security is Cryptography. Usually in Hill cipher there are two keys, of which one acts as encryption key and the other one acts as decryption key.  In this paper we discuss about Hill Cipher using only one key for data encryption and data decryption. Further, we extend our result with dual encryption and decryption process which is explained by using the RSA public key cryptosystem and Hill Cipher and they together execute a powerful cryptosystem to secure the data. \\nObjectives: The purpose of this paper is to obtain and compare the result of data encryption and data decryption using: \\n \\nA matrix which is invertible. \\nA matrix which is Involutory. \\nAn RSA cryptosystem which is applied for Hill Cipher where the matrix is Involutory. \\n \\nMethods: Using Hill Cipher and thereafter Hill Cipher - RSA together we have encrypted and decrypted the data under modulo 255. \\nResults: The text message is converted to coded message and then original message is retrieved by using the three different techniques. \\nConclusions: As the paper involves two stages of encryption and decryption where public key and private key which are unthinkable by the third parities, the security of information is highly appreciable.\",\"PeriodicalId\":40036,\"journal\":{\"name\":\"Communications on Applied Nonlinear Analysis\",\"volume\":\" 13\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Communications on Applied Nonlinear Analysis\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.52783/cana.v31.1063\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Communications on Applied Nonlinear Analysis","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.52783/cana.v31.1063","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

摘要

本文讨论希尔密码系统,即 Rivest、Shamir 和 Adleman 开发的用于文本编码和解码的 RSA 公钥密码系统。为了加密和解密信息,我们使用了欧拉腓函数、全等和矩阵乘法。此外,我们还使用两个密钥进行编码和解码。简介当前,计算机网络、互联网和移动通信是我们社会不可避免的重要组成部分,而保护信息安全免遭黑客攻击则是一项艰巨的任务。信息安全最广泛的应用之一就是密码学。希尔密码通常有两个密钥,其中一个作为加密密钥,另一个作为解密密钥。 本文讨论的希尔密码只使用一个密钥进行数据加密和解密。此外,我们还通过使用 RSA 公钥密码系统和希尔密码来解释双重加密和解密过程,从而扩展我们的成果,并共同执行一个强大的密码系统来保护数据安全。研究目的本文的目的是利用以下方法获得并比较数据加密和数据解密的结果: 可逆矩阵。不可逆矩阵。应用于希尔密码的 RSA 密码系统,其中矩阵为非法定矩阵。 方法:使用希尔密码及其后的希尔密码-RSA,我们对模数为 255 的数据进行了加密和解密。结果:使用三种不同的技术将文本信息转换为编码信息,然后检索原始信息。结论由于本文涉及加密和解密两个阶段,其中的公钥和私钥是第三方无法想象的,因此信息的安全性非常高。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Some Results of Data Encryption and Decryption using Euler’s Totient Function
In this paper, we discuss about the Hill Cipher cryptosystem, the RSA public-key cryptosystem, developed by Rivest, Shamir, Adleman for text encoding and decoding. To encrypt and decrypt the message, we use the Euler Phi-function, congruences, and matrix multiplication. Further, we employ two keys for coding and decoding. Introduction: In present, computer networks, internet and mobile communications are important and inevitable part of our society and security of information from hackers is a big task. One of the most widely used applications for information security is Cryptography. Usually in Hill cipher there are two keys, of which one acts as encryption key and the other one acts as decryption key.  In this paper we discuss about Hill Cipher using only one key for data encryption and data decryption. Further, we extend our result with dual encryption and decryption process which is explained by using the RSA public key cryptosystem and Hill Cipher and they together execute a powerful cryptosystem to secure the data. Objectives: The purpose of this paper is to obtain and compare the result of data encryption and data decryption using: A matrix which is invertible. A matrix which is Involutory. An RSA cryptosystem which is applied for Hill Cipher where the matrix is Involutory. Methods: Using Hill Cipher and thereafter Hill Cipher - RSA together we have encrypted and decrypted the data under modulo 255. Results: The text message is converted to coded message and then original message is retrieved by using the three different techniques. Conclusions: As the paper involves two stages of encryption and decryption where public key and private key which are unthinkable by the third parities, the security of information is highly appreciable.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
0.30
自引率
0.00%
发文量
0
期刊最新文献
An Comparison of Different Cluster Head Selection Techniques for Wireless Sensor Network Matthews Partial Metric Space Using F-Contraction A Common Fixed Point Result in Menger Space Some Applications via Coupled Fixed Point Theorems for (????, ????)-H-Contraction Mappings in Partial b- Metric Spaces ARRN: Leveraging Demographic Context for Improved Semantic Personalization in Hybrid Recommendation Systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1