Soft public key cipher

Ameer A. J. AL-Swidi, Enas Hamood Al-Saadi, Lamis Hamood Al-Saadi

Abstract


Encryption in general is the process of keeping up the secrecy of data (both fixed and versatile) utilizing programs that can Convert and make an interpretation of that data into codes so that whenever got to by unapproved people doesn't They can comprehend anything since what appears to them is a blend of images, numbers and unlimited characters, the file is encrypted And decryption by password, which must be known to both parties (sender and receiver) This is called With symmetric encryption, Decryption means decryption. The quality and viability of encryption rely upon two key factors: the algorithm, and the key length evaluated by Bit, the higher the bit, the greater the security and difficulty of decrypting. The concept of soft set was studied and applied on the public key cryptography like simple Knapsack and Trapdoor Knapsack ciphers. Significant results were presented that was the measure of the evaluate encryption using the SNR and PSNR.

Keywords


Soft simple Knapsack, Soft trapdoor Knapsack, SNR, PSNR

Full Text:

PDF

References


P. Sundarayya and G. Vara Prasad, “A public key cryptosystem using Affine Hill Cipher under modulation of prime number,” Journal of Information and Optimization Sciences, vol. 40, no. 4, pp. 919–930, May 2019.

S. Sadeghi and N. Bagheri, “Security analysis of SIMECK block cipher against related-key impossible differential,” Information Processing Letters, vol. 147, pp. 14–21, Jul. 2019.

I. Al-Barazanchi, S. A. Shawkat, M. H. Hameed, and K. S. L. Al-Badri, “Modified RSA-based algorithm: A double secure approach,” Telkomnika (Telecommunication Comput. Electron. Control., vol. 17, no. 6, pp. 2818–2825, 2019.

M. A. Maricar and N. P. Sastra, “Efektivitas Pesan Teks Dengan Cipher Substitusi, Vigenere Cipher, dan Cipher Transposisi,” Majalah Ilmiah Teknologi Elektro, vol. 17, no. 1, p. 59, Mar. 2018.

S. B. Thigale, R. K. Pandey, P. R. Gadekar, and V. A. Dhotre, “Lightweight novel trust based framework for IoT enabled wireless network communications,” Period. Eng. Nat. Sci., vol. 7, no. 3, pp. 1126–1137, 2019.

Y. Wei, P. Xu, and Y. Rong, “Related-key impossible differential cryptanalysis on lightweight cipher TWINE,” Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 2, pp. 509–517, Jan. 2018.

R. M. Marzan, “Randomness Analysis on Enhanced Key Security of Playfair Cipher Algorithm,” International Journal of Advanced Trends in Computer Science and Engineering, pp. 1248–1253, Aug. 2019.

L. Kraleva, V. Rijmen, and N. L. Manev, “Correlation Distribution Analysis of a Two-Round Key-Alternating Block Cipher,” Tatra Mountains Mathematical Publications, vol. 73, no. 1, pp. 109–130, Aug. 2019.

H. Jiao, T. Pu, L. Shi, Y. Chen, and L. Yu, “A novel realization of quantum stream cipher with key-modulated local light,” Optical Fiber Technology, vol. 53, p. 102007, Dec. 2019.

S. Park, J. Kim, K. Cho, and D. H. Yum, “Finding the key length of a Vigenère cipher: How to improve the twist algorithm,” Cryptologia, pp. 1–8, Oct. 2019.




DOI: http://dx.doi.org/10.21533/pen.v7i3.786

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Ameer A. J. AL-Swidi, Enas Hamood Al-Saadi, Lamis Hamood Al-Saadi

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2303-4521

Digital Object Identifier DOI: 10.21533/pen

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License