Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security  被引量:1

在线阅读下载全文

作  者:Sumaira Azhar Naveed Ahmed Azam Umar Hayat 

机构地区:[1]Department of Mathematics,Quaid-i-Azam University,Islamabad,45320,Pakistan [2]Department of Applied Mathematics and Physics,Graduate School of Informatics,Kyoto University,Kyoto,606-8501,Japan

出  处:《Computers, Materials & Continua》2022年第6期4971-4988,共18页计算机、材料和连续体(英文)

基  金:This research is funded through JSPS KAKENHI Grant Number 18J23484,QAU-URF 2015;HEC project NRPU-7433.

摘  要:The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks.We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack.The proposed scheme is based on the Pell sequence and elliptic curves,where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set.In the second step,we hide the elements of the diffused plain text from the attackers.For this purpose,we use the Pell sequence,a weight function,and a binary sequence to encode each element of the diffused plain text into real numbers.The encoded diffused plain text is then confused by generating permutations over elliptic curves in the third step.We show that the proposed scheme has provable security against key sensitivity attack and statistical attacks.Furthermore,the proposed scheme is secure against key spacing attack,ciphertext only attack,and known-plaintext attack.Compared to some of the existing text encryption schemes,the proposed scheme is highly secure against modern cryptanalysis.

关 键 词:Text encryption pell numbers elliptic curves key sensitivity statistical cryptanalysis 

分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象