A Secure Encryption/Decryption Technique using Transcendental Number

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2015 by IJCTT Journal
Volume-29 Number-3
Year of Publication : 2015
Authors : M. Ranjith Kumar, S. Selvin Pradeep Kumar
  10.14445/22312803/IJCTT-V29P124

MLA

M. Ranjith Kumar, S. Selvin Pradeep Kumar "A Secure Encryption/Decryption Technique using Transcendental Number". International Journal of Computer Trends and Technology (IJCTT) V29(3):136-141, November 2015. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
The rapid change in communication and network technology makes the transfer of secret message/information through insecure channel highly vulnerable. Hence the security of information exchanged becomes a critical and imperative issue. Towards this direction, we examine the new encryption/decryption technique with digital signature using the decimal expansion of transcendental number is obtained.

References
[1] W.N. Bailey, Generalized Hypergeometric series, Cambridge, England: University Press, 1935.
[2] M. Bellare, R. Canetti and H. Krawczyk, Keying hash functions for message Authentication. In N. Koblitz, editor, CRYPTO’96, vol.1109 of LNCS, Pages 1-15, Springer-Verlag, 1996.
[3] T.L. Boullion and P.L. Odell, Generalized Inverse Matrices. Wiley, Newyork, pages 41-62, 1971.
[4] M. Eisenberg, Hill ciphers and Modular Linear Algebra. Mimeographed Notes, University of Massachusetts, 1998.
[5] G.H. Hardy, Hypergeometric series, ch-7 in Ramanujan: Twelve Lectures on subjects suggested by His Life and Work, 3rd ed., New York: Chelsea, p 101-112, 1999.
[6] Howard Anton and Rorres chris, Elementary Linear Algebra. 8th edition, Newyork: John-Wiley & Sons Inc., pages 678-688, 2000.
[7] I.A. Ismail, M. Amin and H. Diab, How to repair the Hill cipher. Journal of Zhejiang University Science vol.7, no.12, 2006.
[8] S. Lester Hill, Cryptography in an algebraic alphabet. Amer. Math., pages 306-312, 1929.
[9] A.J. Menezes , P.C. Van Oorchot and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 2000.
[10] Neal Koblitz, A course in Number Theory and Cryptography, Springer, 2nd edition, 1994.
[11] R. Penrose, A generalized Inverse for matrices. Communicated by J.A. Todd Received 26 July 1954.
[12] Predrag Stanimirovic and Miomir Stankovic, Determinants of rectangular matrices and Moore-Penrose inverse. Novi sad J.Math., Vol.27, No.1, pages 53-69, 1997.
[13] Rhee and Man Young, Cryptography and Secure Communications. McGraw - Hill co., 1994.
[14] R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, vol.21, pp.120-126, 1978.
[15] S Sandeep Babu , N.Subhash Chandra, An Adequate Password Authentication Scheme for Information Interchange using Keys, International Journal of Computer Trends and Technology, Vol.14, 2014.
[16] Shigeru Kondo and Alexander J. Yee , A list of notable large computations of e. Numberworld.org. Last updated: March 7, 2011. Retrieved on 2012-02-24.
[17] M.K. Viswanath and M. Ranjithkumar, A Public Key Cryptosystem Using Hill’s Cipher. Journal of Discrete Mathematical Sciences & Cryptography, Vol. 18, No. 1 & 2, pages. 129–138, 2015.

Keywords
Hill’s cipher, pseudo inverse of a rectangular matrix, Hypergeometric function.