Design of a Discrete Logarithmic Problem Based Exchange Public Key Cryptosystem in the Finite Algebraic Extension Field of a Finite Field
Journal Title: International Journal of Engineering and Science Invention - Year 2017, Vol 6, Issue 9
Abstract
Every user, while communicating privately over a public channel, wish for a trusted channel to communicate securely thus eliminating the least chance of the intruder getting access to it, either at transit or in store. Cryptography - the most popular technique to provide secure data communication is hence studied extensively from the middle of 1970’s. Even though there exists few limitations, cryptography is here to stay primarily because it has played a key role in providing strong, reliable, and robust network data security thus safeguarding users’ privacy. Through this research paper, authors propose a public key cryptosystem, which works in an algebraic extension field over a finite field. In the construction the authors use primitive polynomials over the finite field. In this system each user encrypted his text into two parts and sends the first part to the one. The receiver also encrypted the received text into two parts and sends the first part to the sender. This process can be repeated a finite number of times. The proposed system has all the major features of the popular exchange public key cryptosystem and the security of the system is as good as the difficulty of solving discrete logarithm problem (DLP) over the finite field. Proposed system is implemented and tested in Mat lab to verify its potential for implementation in the Open Systems.
Authors and Affiliations
M. I. Saju, P. L. Lilly
Plantlet Regeneration from Leaf Explants of Gymnema Sylvestre (Retz) R. Br. Ex Roemer & Schultes. An Important Medicinal Plant
The present study was undertaken to investigate the possibility for developing a one-step regeneration protocol in Gymnema sylvestre (Retz) R. Br. For this, the effect of Leaf explants was cultured on MS medium containin...
The Evaluation of Generic Architecture for Information Availability (GAIA) and Multi agent System Engineering (MaSE)
Along with the growing interest in agent applications, there has been an increasing number of agentoriented software engineering methodologies proposed in recent years. These methodologies were developed and specially ta...
Zero-shot learning with Fast RCNN and Mask RCNN through semantic attribute Mapping
Machine learning applications increasingly address large and diverse data sets. While this leads to an abundance of some classes of data, it also uncovers objects that defy categorization in previously seen classes. Lear...
Depth of Cuts in Cement Stabilized Sand
Cliffs almost vertical can be seen in clay deposits due to cohesion. This property can very well be utilized for laying services like water supply pipes, sewers etc without any external support systems. But in sand, cuts...
Implementation of Six Sigma Method in the Chip Inductor Production Process to Reduce Product Defects; Case Study In PT. XYZ
Chip inductors are critical components used in LCD displays to support the display of the mobile phone screen at any time switched on. This component is produced by PT. XYZ is a manufacturing company that produces electr...