Abstract

The variation of decisional learning parity with noise (DLPN) named as key-Ordered DLPN based security algorithm is presented in this work. The proposed scheme uses DLPN by extending it to an even-odd-order scheme, depend on the value of probability distribution of odd and even bits for encryption, where odd and even bits are the input integer values for key generation algorithm. This states that the probability distribution of odd and even bits are ordered based on the key generation, the process of odd and even bits resolving is the solution of DLPN attacker problems, thus, the proposed scheme provides more correctness and security proof. Through the learning parity with noise (LPN), DLPN and RSA algorithms, the proposed system is evaluated, to measure the encryption time, public key and ciphertext bits.

Highlights

  • To provide data security, in a confidential and in an authorized encryption, there is a need of protection to the information from an unauthenticated user [1,2,3]

  • From the survey works, motivated with the challenges in cryptography, a variation of decisional learning parity with noise (DLPN) with two order bits has been proposed, where the keys are dependent of learning parity with noise (LPN) variables and is possible to enhance the scheme by odd and even bits with newly computed bits during the process of encryption and decryption [9,10,11,12,13,14,15]

  • The proposed work in this paper is an approach through the tradition public key cryptography scheme RSA [26,27,28] and current public key cryptography schemes LPN [29] and DLPN [29], so we restrict our discussions and contributions among RSA, LPN and DLPN only

Read more

Summary

INTRODUCTION

In a confidential and in an authorized encryption, there is a need of protection to the information from an unauthenticated user [1,2,3]. Public key is used for encryption process and private key is used for decryption process. From the survey works, motivated with the challenges in cryptography, a variation of DLPN with two order bits has been proposed, where the keys are dependent of LPN variables and is possible to enhance the scheme by odd and even bits with newly computed bits during the process of encryption and decryption [9,10,11,12,13,14,15]. DLPN [29], which is a public-key encryption scheme to improve the security. √ noise rate and randomly selected public and private key vectors and respectively, by assuming the DLPN probabilistic polynomial time (PPT) parameters is negligible

Contributions
Algorithms
Mathematical Explanation
Proposed Scheme
Mathematical Representation of Proposed DLPN with two order bits Algorithm
APPLICATION IS A WEB MODEL
RESULTS AND DISCUSSIONS
Key Generation Time
Encryption Time and Decryption Time
Method
CONCLUSIONS

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.