An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
Keywords:
ElGamal, adjacency matrix, Finite state machine, encryption, decryptionAbstract
Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information. In the recent years, researchers developed several new encryption methods. Among such ElGamal encryption is the one laid a concede platform for the researchers in Cryptography. Ever science several mathematical models were applied for encryption/decryption. In this paper, we introduced an ElGamal encryption, which uses points on the elliptic curve, and finite state machines and adjacency matrix.
References
. N.Kobliz.Elliptic curve Cryptosystem Mathematics of computation, 48203-209, 1987.
. A text book of Guide to elliptic curve Cryptography by Darrel Hancott Vanstone.
. N. Kobliz. Hyper Elliptic Cryptosystem. International Journal of Cryptography, 139-150, 1989.
. An introduction to the theory of Elliptic Curves by Joseph H.Silverman brown University and NTRU Cryptosystems.
. A text book of Cryptography and Network Security by William Stallings.
. Adesh K.Pandey. reprint 2009, “An introduction to automata theory and formal languages S.K.Kararia & sons. New Delhi.
. Johan E.Hopcroft, Rajeev Motwin, Jeffrey D.Uiman. “Introduction to automata theory, language, and computation ” Vanstone 3 rd impression, 2007 CRC press, Dorling Kindersley (India)Pvt.Ltd.
. http://www.certicom.com/index.php/ecctutorial.
. P.A.Jyotirmie, B.Ravi Kumar, A.Chandra Sekhar, S.Uma Devi “A One to one Correspondence in elliptic Curve Cryptography” International Journal of Mathematical archive-4(3),2013: 300-304.
. B.krishna Gandhi, A.Chandra Sekhar, S.Srilaksmi. “Cryptography Scheme for Digital Signals using Finite State Machines” International Journal of Computer Applications, September 2011.
K.R.Sudha , A.chandra Sekhar ,Prasad Reddy P.V.G.D. “Cryptography Protection of Digital Signals using Some recurrence relations”
International Journal of Computer Science and Network security, Vol (7) no 5 may 2007, 203-207.
T.ElGamal,“A public-key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, on Information Theory, 469- 472, 1985.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2015 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.