Encryption and Decryption without any Cryptographic Algorithm

Authors

  • K Mani  Department of Computer Science Nehru Memorial College, Puthanampatti, Tiruchirappalli District, Tamil Nadu, India
  • R. Mahendran  Department of Computer Science Nehru Memorial College, Puthanampatti, Tiruchirappalli District, Tamil Nadu, India

Keywords:

Multivariate Polynomial, Magic Rectangle, Vandermonde Matrix, 1-1 function, Inverse function and Key

Abstract

In both symmetric and asymmetric cryptosystems key plays a vital role in performing both encryption and decryption. Symmetric-key encryption is very fast but key management is a major issue. Asymmetric or public-key encryption is slow in nature but key management is not a major issue because one key is derived from another. In both encryption algorithms the security of cryptographic algorithms depends on the size of the key. Normally, the key is shared in symmetric-key algorithm or derived in public-key algorithm, then encryption is performed using any one of the cryptographic algorithms. But, in this paper, a novel method is used in generating the key in terms of 1-1 function for encryption and the inverse of 1-1 function is used for decryption. For generating the key a multivariate polynomial, magic rectangle and Vandermonde Matrix are used. Based on 1-1 and inverse of 1-1 function encryption and decryptions are performed respectively without using any existing cryptographic algorithm

References

  1. Introduction to Cryptography: Principles and Applications, Book by Hans Delfs and Helmut Knebl, Springer, third edition, 2002.
  2. A.J. Menezes, P.C. Van Oorschot, and S. Vanstone, "Handbook of Applied   Cryptography", CRC Press, Boca Ration, Florida, USA, 1997.
  3. Multivariate Cryptography precision.moscito.org / by-publication /recent/00421-multivariate.pdf.
  4. Lih-Chung Wang, Bo-Yin Yang, Yu-Hua Hu, and  Feipei Lai "A  Medium-Field  Multivariate Public-Key Encryption Scheme", 2015.
  5. Ding, J., Hu, L. High order linearization equation (hole) attack on multivariate public key cryptosystems, Lecture Notes in Computer Science, 4450: 233–248, 2007.
  6. Xin Wang , Feng Feng, Xinmei Wang, Qi Wang,  "A More Secure MFE Multivariate Public Key Encryption  Scheme",  International Journal of Computer Science and Applications Technomathematics  Research Foundation Vol. 6, No. 3, pp. 1-9 , 2009.
  7. Yun-Ju Huang, Feng-Hao Liu, Bo-Yin Yang, "Public-Key Cryptography from New Multivariate Quadratic Assumptions", May 15, 2012.
  8. Farshid Delgosha, Erman Ayday, Faramarz Fekri , MKPS: A Multivariate Polynomial Scheme for Symmetric Key-Establishment in Distributed Sensor Networks.
  9. Rajesh P. Singh, B. K. Sarma, A. Saikia, "Public key cryptography using Permutation P-Polynomials  over Finite Fields".
  10. Jean-Paul Tremblay, R. Manohar "Discrete Mathematical Structures with Applications to Computer Science", February 2nd 2001 , McGraw Hill Education.
  11. Douglas Wilhelm Harder The Vandermonde Method, University of Waterloo, Onrario,Canada N2L 3GI, https://ece.uwaterloo.ca/~dwharder/NumericalAnalysis/05 Interpolation/Vandermonde.
  12. Wikipedia Vandermonde Matrix, https://en.wikipedia.org/wikiVander monde_matrix.
  13. Ruma Kareem Ajeena,  Hailiza Kamarulhaili and  Sattar B. Almaliky, "Bivariate Polynomials Public Key Encryption Schemes" , International Journal of Cryptology Research 4(1): 73 – 83, 2013.
  14. Mani. K, Viswambari. M, "Enhancing the Security in Cryptosystems Based on Magic Rectangle", International Journal of Computer Network and Information Security (IJCNIS), Vol. 9, No.4, 2017.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
K Mani, R. Mahendran, " Encryption and Decryption without any Cryptographic Algorithm, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1709-1716, January-February-2018.