An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines

Authors

  • Kumar BR Department of Mathematics, GIT, Gitam University, Visakhapatnam, INDIA
  • Sekhar AC Department of Mathematics, GIT, Gitam University, Visakhapatnam, INDIA
  • Naidu GA Department of Mathematics, Andhra University, Visakhapatnam, INDIA

Keywords:

ElGamal, adjacency matrix, Finite state machine, encryption, decryption

Abstract

Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information. In the recent years, researchers developed several new encryption methods. Among such ElGamal encryption is the one laid a concede platform for the researchers in Cryptography. Ever science several mathematical models were applied for encryption/decryption. In this paper, we introduced an ElGamal encryption, which uses points on the elliptic curve, and finite state machines and adjacency matrix.

References

. N.Kobliz.Elliptic curve Cryptosystem Mathematics of computation, 48203-209, 1987.

. A text book of Guide to elliptic curve Cryptography by Darrel Hancott Vanstone.

. N. Kobliz. Hyper Elliptic Cryptosystem. International Journal of Cryptography, 139-150, 1989.

. An introduction to the theory of Elliptic Curves by Joseph H.Silverman brown University and NTRU Cryptosystems.

. A text book of Cryptography and Network Security by William Stallings.

. Adesh K.Pandey. reprint 2009, “An introduction to automata theory and formal languages S.K.Kararia & sons. New Delhi.

. Johan E.Hopcroft, Rajeev Motwin, Jeffrey D.Uiman. “Introduction to automata theory, language, and computation ” Vanstone 3 rd impression, 2007 CRC press, Dorling Kindersley (India)Pvt.Ltd.

. http://www.certicom.com/index.php/ecctutorial.

. P.A.Jyotirmie, B.Ravi Kumar, A.Chandra Sekhar, S.Uma Devi “A One to one Correspondence in elliptic Curve Cryptography” International Journal of Mathematical archive-4(3),2013: 300-304.

. B.krishna Gandhi, A.Chandra Sekhar, S.Srilaksmi. “Cryptography Scheme for Digital Signals using Finite State Machines” International Journal of Computer Applications, September 2011.

K.R.Sudha , A.chandra Sekhar ,Prasad Reddy P.V.G.D. “Cryptography Protection of Digital Signals using Some recurrence relations”

International Journal of Computer Science and Network security, Vol (7) no 5 may 2007, 203-207.

T.ElGamal,“A public-key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, on Information Theory, 469- 472, 1985.

Downloads

Published

2024-02-26

How to Cite

Kumar, B., Sekhar, A., & Naidu, G. (2024). An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines. COMPUSOFT: An International Journal of Advanced Computer Technology, 4(03), 1548–1554. Retrieved from https://ijact.in/index.php/j/article/view/269

Issue

Section

Original Research Article

Similar Articles

<< < 4 5 6 7 8 9 10 11 12 13 > >> 

You may also start an advanced similarity search for this article.