Abstract

This article presents an information permutation and breaking scheme to construct a low-cost encryption scheme. The proposed encryption scheme pre- serves the security requirements of a general encryption scheme. The presented re- search uses information entropy to depict the one-way property and tries to use en- tropy to study the one-way property. The authors also present an estimation of the reasonable size of the seed set of a pseudo-random number generator. Mobile computing continues to grow in importance. Machines that are designated to perform mobile computing are notebook PCs, PDAs, and mobile phones. In general, these machines have lower power than desktop PCs, and one of the main applications of these machines is communication. The owners of these machines communicate with each other or to some host machines. The business users of these lower power machines may need to exchange secret messages with other machines. The main tech- nique to protect these secret messages is computer cryptography. The most popular cryptosystems are public-key cryptosystems.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call