Abstract

In this paper, an improved encryption algorithm based on numerical methods and rotation–translation equation is proposed. We develop the new encryption-decryption algorithm by using the concept of symmetric key instead of public key. Symmetric key algorithms use the same key for both encryption and decryption. Most symmetric key encryption algorithms use either block ciphers or stream ciphers. Our goal in this work is to improve an existing encryption algorithm by using a faster convergent iterative method, providing secure convergence of the corresponding numerical scheme, and improved security by a using rotation–translation formula.

Highlights

  • Cryptography is a practice and study of techniques of hidden data transfer so that only the intended receivers can extract and read the data [1]

  • One of the first published works that consider symmetric key encryption algorithm based on numerical methods is by Ghosh in [24], where it is shown that any nonlinear function with one variable f (z) can be defined as a key

  • In order to achieve this, the new scheme will be based on employing numerical iterative methods and rotation–translation formula

Read more

Summary

Introduction

Cryptography is a practice and study of techniques of hidden data transfer so that only the intended receivers can extract and read the data [1]. A cryptographic system is a set of algorithms, seeded by key that encrypt given messages into ciphertext and recover them back into input data. For asymmetric key cryptography, two keys are used: the first one is made publicly available to senders for encrypting plaintext while the second key is kept secret and is used by the receivers for decrypting the ciphertext. Many symmetric data encryption algorithms have been proposed. Novel symmetric data encryption algorithms based on logistic chaotic formula are presented in [13,14,15]. A chaotic logistic map filtered with binary function is proposed to text encryption scheme in Reference [16]. An algorithm of chaotic data encryption system by using private characteristic of electrocardiogram (ECG) signal and logistic map is designed in [18]. In [23], a modified quadratic map for numeric sensor data encryption is proposed

Symmetric Key Encryption Algorithms Based on Numerical Methods
On Numerical Methods for Solving Nonlinear Equations
Base of Rotation–Translation Equation
Nonlinear Function
Polynomial Function
An Example of Encryption
Brute-Force Attack Analysis
Statistical Test Analysis of the Proposed Encryption
Evaluation
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call