Abstract

Owing to mathematical theory and computational power evolution, modern cryptosystems demand ingenious trapdoor functions as their foundation to extend the gap between an enthusiastic interceptor and sensitive information. This paper introduces an adaptive block encryption scheme. This system is based on product, exponent, and modulo operation on a finite field. At the heart of this algorithm lies an innovative and robust trapdoor function that operates in the Galois Field and is responsible for the superior speed and security offered by it. Prime number theorem plays a fundamental role in this system, to keep unwelcome adversaries at bay. This is a self-adjusting cryptosystem that autonomously optimizes the system parameters thereby reducing effort on the user’s side while enhancing the level of security. This paper provides an extensive analysis of a few notable attributes of this cryptosystem such as its exponential rise in security with an increase in the length of plaintext while simultaneously ensuring that the operations are carried out in feasible runtime. Additionally, an experimental analysis is also performed to study the trends and relations between the cryptosystem parameters, including a few edge cases.

Highlights

  • Cryptography is the art of hiding messages to provide it with a certain level of security to maintain confidentiality and integrity

  • A new block cipher encryption scheme was discussed in detail

  • It was observed that longer messages provide better security whereas shorter messages provide faster execution assuming sufficient padding

Read more

Summary

INTRODUCTION

Cryptography is the art of hiding messages to provide it with a certain level of security to maintain confidentiality and integrity. Threshold cryptography is a form of security lock where private keys are distributed among multiple clients or systems They are even asked to provide digital signature authentication for verification purposes. The technique suggested in this study uses an inventive trapdoor function based on the finite field to handle data encryption in cases with enormous string lengths in a reasonable amount of time, demonstrating that it is extremely light. This is a self-adjusting cryptosystem that optimizes the system parameters on its own, saving the user time and Bhowmik and Menon (2021), PeerJ Comput. The paper concludes by briefly summarizing the study’s overall accomplishments and providing important insights into future research directions

LITERATURE REVIEW
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call