A Public-Key Cryptosystem Using Cyclotomic Matrices

06/17/2019
by   Md. Helal Ahmed, et al.
0

Confidentiality and Integrity are two paramount objectives of asymmetric key cryptography. Where two non-identical but mathematically related keys -- a public key and a private key effectuate the secure transmission of messages. Moreover, the private key is non-shareable and the public key has to be shared. The messages could be secured if the amount of computation rises to very high value. In this work we propose a public key cryptosystem using the cyclotomic numbers, where cyclotomic numbers are certain pair of solutions (a,b)_e of order e over a finite field F_q with characteristic p. The strategy employs cyclotomic matrices of order 2l^2, whose entries are cyclotomic numbers of order 2l^2, l be prime. The public key is generated by choosing a particular generator γ^' of F_p^*. Secret key (private key) is accomplished by discrete logarithm problem (DLP) over a finite field F_p.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/15/2020

Removable Weak Keys for Discrete Logarithm Based Cryptography

We describe a novel type of weak cryptographic private key that can exis...
research
02/16/2022

A novel public key cryptography based on generalized Lucas matrices

In this article, we have proposed a generalized Lucas matrix (recursive ...
research
02/02/2023

Asymmetric Cryptosystem Using Careful Synchronization

We present public-private key cryptosystem which utilizes the fact that ...
research
06/04/2020

Design and Hardware Implementation of a Separable Image Steganographic Scheme Using Public-key Cryptosystem

In this paper, a novel and efficient hardware implementation of steganog...
research
05/11/2018

Under the Underground: Predicting Private Interactions in Underground Forums

Underground forums where users discuss, buy, and sell illicit services a...
research
03/13/2019

Learning Symmetric and Asymmetric Steganography via Adversarial Training

Steganography refers to the art of concealing secret messages within mul...
research
05/28/2019

EncryptGAN: Image Steganography with Domain Transform

We propose an image steganographic algorithm called EncryptGAN, which di...

Please sign up or login with your details

Forgot password? Click here to reset