Abstract

Secure communication of the sensitive information in disguised form to the genuine recipient so that an intended recipient alone can remove the disguise and recover the original message is the essence of Cryptography. Encrypting the message two or more times with different encryption techniques and with different keys increases the security levels than the single encryption. A cascade cipher is stronger than the first component. This paper presents multiple encryption schemes using different encryption techniques Braiding/Entanglement of Pauli Spin 3/2 matrices and Rotation of the bits with independent secret keys.

Highlights

  • As the internet is the basic means of communication nowadays secure transmission of the sensitive information has become a Herculean task

  • 1.1 Pauli Spin 3/2 Matrices In Quantum Mechanics a very class of dynamical problems arises with central forces

  • In the cascade cipher presented in this paper the message is encrypted in two stages using two different encryption algorithms with two different keys

Read more

Summary

INTRODUCTION

As the internet is the basic means of communication nowadays secure transmission of the sensitive information has become a Herculean task. In Quantum Mechanics a very class of dynamical problems arises with central forces. These forces are derivable from a potential that depends on the distance (r) of the moving particle from a fixed point, the origin of the co-ordinate system (O). Uhlenbeck and Goudsmit [6,7] in 1925 attributed these difficulties due to the fact that the electron has an additional property of intrinsic angular momentum and magnetic momentum. Braiding/Entanglement of matrices is a technique of generating higher order nonsingular matrices from simple lower order non-singular matrices. Singular matrices of order 2x2 these four non-singular matrices are braided/entangled to get higher order 4x4 matrices as. Non-Singular matrices from the set of these matrices can be selected for the process of encryption/decryption

Literature on Golden Matrices
Rotation of the Bits
PROPOSED METHOD
Decryption
Encryption
CRYPTANALYSIS AND CONCLUSIONS
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.