SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1548
An ElGamal Encryption Scheme of Adjacency Matrix and
Finite Machines
B.Ravi Kumar1
, A.Chandra Sekhar2
, G.Appala Naidu3
1,2
Department of Mathematics,GIT,Gitam University,Visakhapatnam,INDIA.
3
Department of Mathematics,Andhra University,Visakhapatnam,INDIA.
Abstract: Cryptography is the combination of Mathematics and Computer science. Cryptography is
used for encryption and decryption of data using mathematics. Cryptography transit the information in
an illegible manner such that only intended recipient will be able to decrypt the information. In the
recent years, researchers developed several new encryption methods. Among such ElGamal
encryption is the one laid a concede platform for the researchers in Cryptography. Ever science
several mathematical models were applied for encryption/decryption. In this paper, we introduced an
ElGamal encryption, which uses points on the elliptic curve, and finite state machines and adjacency
matrix.
Keywords: ElGamal, adjacency matrix, Finite state machine, encryption, decryption.
I. Introduction:
In the year, 1985 Victor Miller and Neal
Koblitz first introduced the Elliptic curve
cryptography. Elliptic curve cryptography has
proven its security by with standing to a
generation of attacks. In the recent years, as
the wireless communication has grown
rapidly, the numerous companies have adopted
Elliptic curve cryptography as an innovative
security technology. Elliptic curve employs a
relatively short encryption key and the shorter
key size is faster and requires less compelling
power than the other. Elliptic curve
cryptography encryption key provides the
same security as „1024‟-bit RSA encryption
key [1][2][3][4][8].
In general, cubic equations for elliptic curves
take the following form, known as Weierstrass
equation[5]:
kjxixxhygxyy  232
Where g,h,i,j,k are real numbers and x,y take
on values in the real numbers. For our purpose,
it is sufficient to limit ourselves to equations of
the form hgxxy  32
where x,y,g,h belong to R, Q, C or Fp. Also
include in the definition of an elliptic curve is
a single element denoted by O and called the
point at infinity or the zero point. There is also
a requirement that the discriminant
].5][4[0274 23
 hg
II. The ElGamal Cryptosystem:
Two communicating parties „A‟ and „B‟
initially agree upon the Elliptic curve
),( yxEp and p is sufficiently large prime
number and (x,y) is the point on the Elliptic
curve. For secure communication over
insecure channels both A and B fix a point
C(x1,y1). A initially selects a private key „KA‟
and generates the public key .CKP AA 
Next „B‟ selects a private key KB and
generates the public key .CKP BB  Now
A wants send a message M to B for this
purpose A choose a random integer „n‟ now A
encrypts M as },{ Bm nPMnCCT  and
sends to B.
ISSN:2320-0790
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1549
Then „B‟ decrypts the CTm as
].12[
)()()(
M
CnKCKnMnCKnPM BBBB


III. Finite state Machine:
Automata theory is a key to software for
verifying systems of all types that have a finite
number of distinct states, such as
communication protocols or protocol for
secure exchange of information. Finite state
machines (FSM), also known as finite state
automation (FSA), at their simplest, are
models of the behaviours of a system or a
complex object, with a limited number of
defined conditions or modes, where mode
transitions change with circumstance[6][7].
A deterministic finite automation (DFA) is a
quintuple ),,,,,( 0 FqQM  where
 Q is a finite set of states.
  is a finite set of input symbols.
 q0 is the start state indicated by an
arrow .
  is a transition function
QQ : i.e., .),( 0 Qqaq i 
 QF  is a finite set of final states.
Generally the input symbols of  are either
letters or digits. i.e., }1,0{},{ orba and
*
 is the set of strings formed out of .
Sometimes we refer strings as languages also.
We say that a string x is accepted by a DFA if
.),( 0 Fxq  The set of languages accepted
by a DFA „M‟ is denoted by L(M). In a DFA
there will be only one transition out of each
state on the same input symbol. The
nondeterministic finite automation (NDFA) is
also a mathematical model ),,,,( 0 FqQM 
where FqQ ,,, 0 are as in DFA except , is a
transition function from .*
QQ  In NDFA
there may be Moore machine is a sixtuple
),,,,,( 0qQM   Where 0,,, qQ  are
as before and  is a output function and  is
the set of output symbols. In a More machine
the output depend on the transition.
Transition table, as well as transition diagram
can also represent Moore machine.
In this paper, consider Moore machine, which
calculates residue mod4.
IV. Adjacency matrix:
Let ),( EVG  be a simple directed graph
where },......,,{ 321 nvvvvV  be the set of
nodes and E is the set of edges. Then


 
 
otherwise
Evvif
aA ji
nnij
0
),(1
][
The adjacency matrix is a Boolean matrix as
the entries are 0‟s or 1‟s.
The number elements in the ith row whose
value is 1 in a column, say the jth
column, is
equal to the indegree of the node vj. an
adjacency matrix completely defines a simple
digraph.
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1550













0111
1011
1101
1110
B
 The entries along the principal diagonal of B
are all 0‟s if and only if the graph as no self
loops. A self-loop at the ith vertex corresponds
to xij=1.
 The definition of adjacency matrix makes no
provision for parallel edges. This is why the
adjacency matrix B was defined for graphs
without parallel edges.
 If the graph has no self-loops the degree of a
vertex equals the number of 1‟s in the
corresponding row or column of B.
V. PROPOSED ALGORITHM:
Alice wants to send the message to Bob using
elliptic curve ElGamal encryption by using
adjacent matrix. Alice chooses the elliptic
curve hgxxy  32
over the field pz .
Choose the point G on the elliptic curve. Alice
selects a private key „a‟ and generates the
public key A=„aG‟ and Bob selects a private
key „b‟ and generates the public key B= „bG‟.
Encryption:
Step 1: Alice chooses a random integer k, and
keeps it secret.
Step 2: Compute kG.
Step 3: Alice selects the Bob‟s public key
.bGB 
Step 4: Compute .)( lbGkkB 
Step 5: Compute .)( mbGaaB 
Step 6: Alice wants to send the message iq to
Bob.
Step 7: Alice wants to convert the message
into the points on the elliptic curve. She
chooses a point Q, which is the generator of
the elliptic curve. By using ASCII characters
of upper case letter into the points on the
elliptic curve.
Let
}{
}255................3,2,1{
charactersASCIIallofsetB
PPPPA


Alice defines one to one correspondence
BAf : by nxnPf )(
Where n=1,2………255 and
.}..,.........,,{ 255321 charactersASCIIthearexxxx
Step 8: To create 44 matrix with entries
are the points on the elliptic curve.















16151413
1211109
8765
4321
1
aaaa
aaaa
aaaa
aaaa
m and so on
additional which is obtained depending upon
the length of the message.
Step 9: Alice selects ,m where„s‟ is the x-
coordinate of m and the binary value„s‟
is secret key.
Step 10: Alice define Moore machine with
input is secret key.
Compute
  .
1
1 stateqatoutput
kk
k
matrixadjencyqq 

The resultant sets of points are
),(..).........,(),,(),,({ 333222111 iii yxqyxqyxqyxqR 
where i=1,2,3……
Step 11: Compute .mlqC ii  .
Step 12: Now Alice sends the encrypted
message ),( iCkG to Bob.
Decryption:
To recover the plain text iq from Ci, Bob
should do following:
Step 1: First Bob selects the Alice public key
A=aG.
Step 2: Compute bA=b(aG)=m.
Step 3: Now Bob computes the inverse
element of b(aG) is - b(aG).
Step 4: Add - b(aG)to the second part of the
message: abGabGkbGqi  = kbGqi 
Step 5: Multiply the Bob‟s own private key „b‟
with the first part of the message kG, we get:
kbG.
Step 6: Now Bob computes the inverse
element of kbG, which is –kbG.
Step 7: Bob adds -kbG to the second part of
the message: ii qkbGkbGq  .
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1551
Step 8: after decryption, the obtained points
are stored in 44 matrix.
,....
16151413
1211109
8765
4321
1















qqqq
qqqq
qqqq
qqqq
S
Step 9: Bob selects m, where„s‟ is the x-
coordinate of m which is the secret key and the
binary value„s‟ is input key.
Step 10: Now Bob multiplies iq with inverse
of key matrices „R‟ and Bob applies the
reverse process and by using ASCII characters
of upper case letters, he can recover the
message.
EXAMPLE:
Alice wants to send the message to Bob using
elliptic curve ElGamal encryption by using
adjacency matrix. Alice chooses the elliptic
curve 432
 xy over the field 271z . Then
the points on the elliptic curve are
E={0,(1,57),(1,214),(2,2),(2,269),(5,11),(5,260
),(6,36),(6,235),(7,135),(7,136),…..
………………………………………………
………..................................…………………
…………..(264, 174), (269,114), (269,157)}.
The number of points on the elliptic curve is
271 and the prime number is 271. Therefore
each point is a generator of an elliptic curve
E[9][10][11].
Choose the point G=(68,136) on the elliptic
curve. Alice selects a private key „a‟=6, and
generates the public key A=„aG‟ =
6(68,136)= (85, 199) and Bob selects a
private key „b‟=8, and generates the public
key B= „bG‟ = 8(68,136)= (122 , 259).
Encryption:
Step 1: Alice chooses a random integer k =4,
and keeps it secret.
Step 2: Compute kG= 4(68,136)= (250 ,
189).
Step 3: Alice selects the Bob‟s public key
B=bG= (122, 259).
Step 4: Compute kB=k(bG)=4(122 , 259)=
(132,248).
Step 5: Compute aB=a(bG)=6(122 , 259)=
(215,157)=m.
Step 6: Alice wants to send the message iq to
Bob.
Step 7: Alice wants to convert the message
into the points on the elliptic curve. She
chooses a point Q=(172,240) which is the
generator of the elliptic curve. By using
ASCII characters, of upper letters into the
points on the elliptic curve.
256,259).()240,172(633
55,93),()240,172(622
97,235),()240,172(611
261),,120()240,172(76
64,246),()240,172(65
69,18),()240,172(78
93,5),()240,172(81
38),,183()240,172(73
126,260),()240,172(84
64,246),()240,172(65
69,18),()240,172(78
168,235),()240,172(82
189),,225()240,172(69
126,260),()240,172(84
69,18),()240,172(78
38),,183()240,172(73
















L
A
N
O
I
T
A
N
R
E
T
N
I
Then the points are
259)}5,93)(256,(97,235)(5
(120,261),(64,246),(69,18),(93,5),(183,38),
(126,260),(64,246),(69,18),(168,235),
(225,189),(126,260),(69,38),38),,183{(T
Step 8: To create 44 matrix with entries
are the points on the elliptic curve.















)259,256()93,55()235,97()261,120(
)246,64()18,69()5,93()38,183(
)260,126()246,64()18,69()235,168(
)189,225()260,126()18,69()38,183(
1m
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1552
Step 9: Alice selects ),157,215(m where
215s and the binary value of 215 is
11010111which is input key.
Step 10: Alice define Moore machine with
input is secret key. And compute
𝑞 𝑘+1 =
𝑞 𝑘 × [𝑎𝑑𝑗𝑒𝑛𝑐𝑦 𝑚𝑎𝑡𝑟𝑖𝑥] 𝑜𝑢𝑡𝑝𝑢𝑡 𝑞 𝑘+1 𝑠𝑡𝑎𝑡𝑒
S.
No
I/P Previous
State
Preset
State
O/P n=
O/P+1
Cipher text
1 1 q0 q1 1 2














)244,71()71,228()43,231()100,32(
)103,40()103,36()12,164()80,30(
)151,153()168,36()168,40()160,251(
)226,147()66,260()151,170()258,182(
2 1 q1 q3 3 4














)38,246()244,91()205,48()155,123(
)266,93()98,107()25,64()233,183(
)51,134()25,64()109,59()132,262(
)135,68()23,173()173,107()258,142(
3 0 q3 q2 2 3














)2,56()64,17()253,35()71,151(
)95,208()200,228()73,207()198,230(
)10,120()214,1()12,122()33,139(
)268,60()151,153()235,168()162,159(
4 1 q2 q1 1 2














)60,119()194,258()260,126()170,25(
)36,168()244,109()82,67()31,161(
)111,38()82,225()36,168()176,133(
)239,262()103,40()73,230()248,132(
5 0 q1 q2 2 3














)12,164()13,182()71,228()191,30(
)199,85()12,122()171,156()269,2(
)248,237()101,88()111,253()51,229(
)160,38()23,237()222,135()120,170(
6 1 q2 q1 1 2














)116,192()269,213()168,36()31,161(
)168,40()189,67()199,212()5,13(
)220,134()214,28()10,43()71,228(
)12,256()258,182()141,194()168,195(
7 1 q1 q3 3 4














)205,234()18,167()210,221()214,242(
)98,15()160,38()151,153()220,229(
)205,260()135,7()210,221()98,107(
)222,257()93,185()18,35()116,123(
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1553
8 1 q3 q3 3 4














)43,235()222,135()23,237()45,51(
)3,60()253,69()49,150()211,80(
)261,120()57,1()259,122()238,139(
)222,135()120,153()36,168()109,59(
Then the points are
)}.43,235)(222,135)(23,237(
)45,51)(3,60)(253,69)(49,150(
)211,80)(261,120)(57,1)(259,122(
)238,139)(222,135)(120,153)(36,168)(109,59{(R
kbGabGqCComputeStep ii :11
(179,51),(215,157)(132,248))3,60(
(226,61),(215,157)(132,248))253,69(
(95,210),(215,157)(132,248))49,150(
(205,64),(215,157)(132,248))211,80(
(19,139),(215,157)(132,248))261,120(
(83,100),(215,157)(132,248))57,1(
(231,228),(215,157)(132,248))259,122(
(230,198),(215,157)(132,248))238,139(
(167,253),(215,157)(132,248))222,135(
(156,100),(215,157)(132,248))120,153(
(120,261),(215,157)(132,248))36,168(
(49,207),(215,157)(132,248))109,59(
12
11
10
9
8
7
6
5
4
3
2
1












C
C
C
C
C
C
C
C
C
C
C
C
(119,60).(215,157)(132,248))43,235(
,(157,268))(215,157)(132,248))222,135(
(35,18),(215,157)(132,248))23,237(
(105,73),(215,157)(132,248))45,51(
16
15
14
13




C
C
C
C
Step12: Now Alice sends the encrypted
message consisting of pair of points
}.(119,60))189),,(250
(167,253))189),,50(35,18))(2189),,(250(105,73))(189),,(250
(179,51))189),,250(226,61))(189),,250(95,210))(189),,(250
(205,64))189),,250(19,139))(189),,250(83,100))(189),,(250
(231,228))189),,(250(230,198))189),,(250(167,253))189),,(250(
(156,100))189),,(250(,(120,261))189),,(250((49,207))189),,(250{(
to Bob.
Decryption:
Bob applies the reverse process and recovers
the message “INTERNATIONAL123”.
VI. Conclusions:
In the proposed work, the plain text is
converted to points on the elliptic curve by one
to one correspondence using ASCII characters.
The encryption process uses the finite state
machines, adjacency matrices and the key
generation process uses the ElGamal
encryption taking security, confidentiality, and
authenticity into consideration. The obtained
cipher text becomes quite difficult to break or
to extract the original information even if the
algorithm is known.
References:
[1]. N.Kobliz.Elliptic curve Cryptosystem
Mathematics of computation, 48203-
209, 1987.
[2]. A text book of Guide to elliptic curve
Cryptography by Darrel Hancott
Vanstone.
[3]. N. Kobliz. Hyper Elliptic Cryptosystem.
International Journal of Cryptography,
139-150, 1989.
[4]. An introduction to the theory of Elliptic
Curves by Joseph H.Silverman brown
University and NTRU Cryptosystems.
[5]. A text book of Cryptography and
Network Security by William Stallings.
[6]. Adesh K.Pandey. reprint 2009, “An
introduction to automata theory and
formal languages S.K.Kararia & sons.
New Delhi.
[7]. Johan E.Hopcroft, Rajeev Motwin,
Jeffrey D.Uiman. “Introduction to
automata theory, language, and
computation ” Vanstone 3 rd impression,
2007 CRC press, Dorling Kindersley
(India)Pvt.Ltd.
[8]. http://www.certicom.com/index.php/ecc-
tutorial.
[9]. P.A.Jyotirmie, B.Ravi Kumar,
A.Chandra Sekhar, S.Uma Devi “A One
to one Correspondence in elliptic Curve
Cryptography” International Journal
of Mathematical archive-4(3),2013: 300-
304.
[10]. B.krishna Gandhi, A.Chandra Sekhar,
S.Srilaksmi. “Cryptography Scheme
for Digital Signals using Finite State
COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III)
1554
Machines” International Journal of
Computer Applications, September
2011.
[11] K.R.Sudha , A.chandra Sekhar ,Prasad
Reddy P.V.G.D. “Cryptography
Protection of Digital Signals using
Some recurrence relations”
International Journal of Computer
Science and Network security, Vol
(7) no 5 may 2007, 203-207.
[12] T.ElGamal,“A public-key
cryptosystem and a signature
scheme based on discrete
logarithms”, IEEE Transactions on
Information Theory, on Information
Theory, 469- 472, 1985.

Contenu connexe

Tendances

A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte SubstitutionSecure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte SubstitutionCSCJournals
 
GATE Computer Science Solved Paper 2004
GATE Computer Science Solved Paper 2004GATE Computer Science Solved Paper 2004
GATE Computer Science Solved Paper 2004Rohit Garg
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...atanuanwesha
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysisrik0
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMAM Publications
 
Chapter 06 boolean algebra
Chapter 06 boolean algebraChapter 06 boolean algebra
Chapter 06 boolean algebraIIUI
 
Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007 Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007 Rohit Garg
 
Information Theory and Coding Question Bank
Information Theory and Coding Question BankInformation Theory and Coding Question Bank
Information Theory and Coding Question Bankmiraclebabu
 
The dag representation of basic blocks
The dag representation of basic blocksThe dag representation of basic blocks
The dag representation of basic blocksShabeen Taj
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsNIT Sikkim
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Directed Acyclic Graph Representation of basic blocks
Directed Acyclic Graph Representation of basic blocksDirected Acyclic Graph Representation of basic blocks
Directed Acyclic Graph Representation of basic blocksMohammad Vaseem Akaram
 
Design and Analysis of algorithms
Design and Analysis of algorithmsDesign and Analysis of algorithms
Design and Analysis of algorithmsDr. Rupa Ch
 

Tendances (19)

A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte SubstitutionSecure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution
 
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan PalacioElliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
Elliptic curvecryptography Shane Almeida Saqib Awan Dan Palacio
 
GATE Computer Science Solved Paper 2004
GATE Computer Science Solved Paper 2004GATE Computer Science Solved Paper 2004
GATE Computer Science Solved Paper 2004
 
Ecc2
Ecc2Ecc2
Ecc2
 
Improved security system using steganography and elliptic curve crypto...
Improved  security  system using  steganography  and  elliptic  curve  crypto...Improved  security  system using  steganography  and  elliptic  curve  crypto...
Improved security system using steganography and elliptic curve crypto...
 
Network Security CS3-4
Network Security CS3-4 Network Security CS3-4
Network Security CS3-4
 
Social Network Analysis
Social Network AnalysisSocial Network Analysis
Social Network Analysis
 
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHMENCRYPTION USING LESTER HILL CIPHER ALGORITHM
ENCRYPTION USING LESTER HILL CIPHER ALGORITHM
 
Chapter 06 boolean algebra
Chapter 06 boolean algebraChapter 06 boolean algebra
Chapter 06 boolean algebra
 
Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007 Gate Computer Science Solved Paper 2007
Gate Computer Science Solved Paper 2007
 
Information Theory and Coding Question Bank
Information Theory and Coding Question BankInformation Theory and Coding Question Bank
Information Theory and Coding Question Bank
 
The dag representation of basic blocks
The dag representation of basic blocksThe dag representation of basic blocks
The dag representation of basic blocks
 
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve CryptosystemsDiscrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
Directed Acyclic Graph Representation of basic blocks
Directed Acyclic Graph Representation of basic blocksDirected Acyclic Graph Representation of basic blocks
Directed Acyclic Graph Representation of basic blocks
 
Design and Analysis of algorithms
Design and Analysis of algorithmsDesign and Analysis of algorithms
Design and Analysis of algorithms
 
Algorithms Question bank
Algorithms Question bankAlgorithms Question bank
Algorithms Question bank
 

En vedette

Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmAjay Karri
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in CryptographyBasudev Saha
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 

En vedette (8)

Message Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 AlgorithmMessage Authentication using Message Digests and the MD5 Algorithm
Message Authentication using Message Digests and the MD5 Algorithm
 
Hash Techniques in Cryptography
Hash Techniques in CryptographyHash Techniques in Cryptography
Hash Techniques in Cryptography
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Rsa Algorithm
Rsa AlgorithmRsa Algorithm
Rsa Algorithm
 
Secure hashing algorithm
Secure hashing algorithmSecure hashing algorithm
Secure hashing algorithm
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Hash Function
Hash FunctionHash Function
Hash Function
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 

Similaire à An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines

AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYijujournal
 
An Application Of Graph Theory In Cryptography
An Application Of Graph Theory In CryptographyAn Application Of Graph Theory In Cryptography
An Application Of Graph Theory In CryptographyLori Mitchell
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptdlakmlkfma
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptdlakmlkfma
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptographyinventy
 
An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)Hakeem Hunte
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modernEric Seifert
 
Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graphSwathiSundari
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sIDES Editor
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaSoham Mondal
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentationSoham Mondal
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam HelpLive Exam Helper
 
Bca1040 digital logic
Bca1040  digital logicBca1040  digital logic
Bca1040 digital logicsmumbahelp
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...ijtsrd
 

Similaire à An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines (20)

AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHYAUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
AUTHENTICATED PUBLIC KEY ENCRYPTION SCHEME USING ELLIPTIC CURVE CRYPTOGRAPHY
 
An Application Of Graph Theory In Cryptography
An Application Of Graph Theory In CryptographyAn Application Of Graph Theory In Cryptography
An Application Of Graph Theory In Cryptography
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.ppt
 
CHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.pptCHAPTER 02 - Linear codes.ppt
CHAPTER 02 - Linear codes.ppt
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
Elliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key CryptographyElliptic Curves as Tool for Public Key Cryptography
Elliptic Curves as Tool for Public Key Cryptography
 
An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)An Introduction to ECDSA and it's use in Bitcoin (1)
An Introduction to ECDSA and it's use in Bitcoin (1)
 
elliptic-curves-modern
elliptic-curves-modernelliptic-curves-modern
elliptic-curves-modern
 
Data transfer using bipartite graph
Data transfer using bipartite graphData transfer using bipartite graph
Data transfer using bipartite graph
 
Efficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’sEfficient ECC encryption for WSN’s
Efficient ECC encryption for WSN’s
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
Digital Communication Exam Help
Digital Communication Exam HelpDigital Communication Exam Help
Digital Communication Exam Help
 
Computer Network Homework Help
Computer Network Homework HelpComputer Network Homework Help
Computer Network Homework Help
 
Bca1040 digital logic
Bca1040  digital logicBca1040  digital logic
Bca1040 digital logic
 
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
Symmetric Key Generation Algorithm in Linear Block Cipher Over LU Decompositi...
 
G029037043
G029037043G029037043
G029037043
 

Plus de Computer Science Journals

Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.Computer Science Journals
 
Applications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyApplications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyComputer Science Journals
 
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksComputer Science Journals
 
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...Computer Science Journals
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Computer Science Journals
 

Plus de Computer Science Journals (7)

Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.Effect of countries in performance of hadoop.
Effect of countries in performance of hadoop.
 
Computer science journals
Computer science journalsComputer science journals
Computer science journals
 
Applications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief StudyApplications of Fuzzy Logic in Image Processing – A Brief Study
Applications of Fuzzy Logic in Image Processing – A Brief Study
 
Safe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANETSafe Trust Alert Routing in MANET
Safe Trust Alert Routing in MANET
 
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor Networks
 
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
An Efficient Annotation of Search Results Based on Feature Ranking Approach f...
 
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...Performance Observation of Proactive and Reactive Routing Protocols with Incr...
Performance Observation of Proactive and Reactive Routing Protocols with Incr...
 

Dernier

Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...RohitNehra6
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxpradhanghanshyam7136
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |aasikanpl
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfSumit Kumar yadav
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfSumit Kumar yadav
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxkessiyaTpeter
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptMAESTRELLAMesa2
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...Sérgio Sacani
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bSérgio Sacani
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCEPRINCE C P
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksSérgio Sacani
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhousejana861314
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡anilsa9823
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxgindu3009
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisDiwakar Mishra
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...ssifa0344
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Lokesh Kothari
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)PraveenaKalaiselvan1
 

Dernier (20)

The Philosophy of Science
The Philosophy of ScienceThe Philosophy of Science
The Philosophy of Science
 
Biopesticide (2).pptx .This slides helps to know the different types of biop...
Biopesticide (2).pptx  .This slides helps to know the different types of biop...Biopesticide (2).pptx  .This slides helps to know the different types of biop...
Biopesticide (2).pptx .This slides helps to know the different types of biop...
 
Cultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptxCultivation of KODO MILLET . made by Ghanshyam pptx
Cultivation of KODO MILLET . made by Ghanshyam pptx
 
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Mukherjee Nagar(Delhi) |
 
Zoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdfZoology 4th semester series (krishna).pdf
Zoology 4th semester series (krishna).pdf
 
Chemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdfChemistry 4th semester series (krishna).pdf
Chemistry 4th semester series (krishna).pdf
 
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptxSOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
SOLUBLE PATTERN RECOGNITION RECEPTORS.pptx
 
G9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.pptG9 Science Q4- Week 1-2 Projectile Motion.ppt
G9 Science Q4- Week 1-2 Projectile Motion.ppt
 
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
PossibleEoarcheanRecordsoftheGeomagneticFieldPreservedintheIsuaSupracrustalBe...
 
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43bNightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
Nightside clouds and disequilibrium chemistry on the hot Jupiter WASP-43b
 
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCESTERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
STERILITY TESTING OF PHARMACEUTICALS ppt by DR.C.P.PRINCE
 
Formation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disksFormation of low mass protostars and their circumstellar disks
Formation of low mass protostars and their circumstellar disks
 
Orientation, design and principles of polyhouse
Orientation, design and principles of polyhouseOrientation, design and principles of polyhouse
Orientation, design and principles of polyhouse
 
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service  🪡
CALL ON ➥8923113531 🔝Call Girls Kesar Bagh Lucknow best Night Fun service 🪡
 
Presentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptxPresentation Vikram Lander by Vedansh Gupta.pptx
Presentation Vikram Lander by Vedansh Gupta.pptx
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral AnalysisRaman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
Raman spectroscopy.pptx M Pharm, M Sc, Advanced Spectral Analysis
 
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
TEST BANK For Radiologic Science for Technologists, 12th Edition by Stewart C...
 
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
Labelling Requirements and Label Claims for Dietary Supplements and Recommend...
 
Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)Recombinant DNA technology (Immunological screening)
Recombinant DNA technology (Immunological screening)
 

An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines

  • 1. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1548 An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines B.Ravi Kumar1 , A.Chandra Sekhar2 , G.Appala Naidu3 1,2 Department of Mathematics,GIT,Gitam University,Visakhapatnam,INDIA. 3 Department of Mathematics,Andhra University,Visakhapatnam,INDIA. Abstract: Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information. In the recent years, researchers developed several new encryption methods. Among such ElGamal encryption is the one laid a concede platform for the researchers in Cryptography. Ever science several mathematical models were applied for encryption/decryption. In this paper, we introduced an ElGamal encryption, which uses points on the elliptic curve, and finite state machines and adjacency matrix. Keywords: ElGamal, adjacency matrix, Finite state machine, encryption, decryption. I. Introduction: In the year, 1985 Victor Miller and Neal Koblitz first introduced the Elliptic curve cryptography. Elliptic curve cryptography has proven its security by with standing to a generation of attacks. In the recent years, as the wireless communication has grown rapidly, the numerous companies have adopted Elliptic curve cryptography as an innovative security technology. Elliptic curve employs a relatively short encryption key and the shorter key size is faster and requires less compelling power than the other. Elliptic curve cryptography encryption key provides the same security as „1024‟-bit RSA encryption key [1][2][3][4][8]. In general, cubic equations for elliptic curves take the following form, known as Weierstrass equation[5]: kjxixxhygxyy  232 Where g,h,i,j,k are real numbers and x,y take on values in the real numbers. For our purpose, it is sufficient to limit ourselves to equations of the form hgxxy  32 where x,y,g,h belong to R, Q, C or Fp. Also include in the definition of an elliptic curve is a single element denoted by O and called the point at infinity or the zero point. There is also a requirement that the discriminant ].5][4[0274 23  hg II. The ElGamal Cryptosystem: Two communicating parties „A‟ and „B‟ initially agree upon the Elliptic curve ),( yxEp and p is sufficiently large prime number and (x,y) is the point on the Elliptic curve. For secure communication over insecure channels both A and B fix a point C(x1,y1). A initially selects a private key „KA‟ and generates the public key .CKP AA  Next „B‟ selects a private key KB and generates the public key .CKP BB  Now A wants send a message M to B for this purpose A choose a random integer „n‟ now A encrypts M as },{ Bm nPMnCCT  and sends to B. ISSN:2320-0790
  • 2. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1549 Then „B‟ decrypts the CTm as ].12[ )()()( M CnKCKnMnCKnPM BBBB   III. Finite state Machine: Automata theory is a key to software for verifying systems of all types that have a finite number of distinct states, such as communication protocols or protocol for secure exchange of information. Finite state machines (FSM), also known as finite state automation (FSA), at their simplest, are models of the behaviours of a system or a complex object, with a limited number of defined conditions or modes, where mode transitions change with circumstance[6][7]. A deterministic finite automation (DFA) is a quintuple ),,,,,( 0 FqQM  where  Q is a finite set of states.   is a finite set of input symbols.  q0 is the start state indicated by an arrow .   is a transition function QQ : i.e., .),( 0 Qqaq i   QF  is a finite set of final states. Generally the input symbols of  are either letters or digits. i.e., }1,0{},{ orba and *  is the set of strings formed out of . Sometimes we refer strings as languages also. We say that a string x is accepted by a DFA if .),( 0 Fxq  The set of languages accepted by a DFA „M‟ is denoted by L(M). In a DFA there will be only one transition out of each state on the same input symbol. The nondeterministic finite automation (NDFA) is also a mathematical model ),,,,( 0 FqQM  where FqQ ,,, 0 are as in DFA except , is a transition function from .* QQ  In NDFA there may be Moore machine is a sixtuple ),,,,,( 0qQM   Where 0,,, qQ  are as before and  is a output function and  is the set of output symbols. In a More machine the output depend on the transition. Transition table, as well as transition diagram can also represent Moore machine. In this paper, consider Moore machine, which calculates residue mod4. IV. Adjacency matrix: Let ),( EVG  be a simple directed graph where },......,,{ 321 nvvvvV  be the set of nodes and E is the set of edges. Then       otherwise Evvif aA ji nnij 0 ),(1 ][ The adjacency matrix is a Boolean matrix as the entries are 0‟s or 1‟s. The number elements in the ith row whose value is 1 in a column, say the jth column, is equal to the indegree of the node vj. an adjacency matrix completely defines a simple digraph.
  • 3. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1550              0111 1011 1101 1110 B  The entries along the principal diagonal of B are all 0‟s if and only if the graph as no self loops. A self-loop at the ith vertex corresponds to xij=1.  The definition of adjacency matrix makes no provision for parallel edges. This is why the adjacency matrix B was defined for graphs without parallel edges.  If the graph has no self-loops the degree of a vertex equals the number of 1‟s in the corresponding row or column of B. V. PROPOSED ALGORITHM: Alice wants to send the message to Bob using elliptic curve ElGamal encryption by using adjacent matrix. Alice chooses the elliptic curve hgxxy  32 over the field pz . Choose the point G on the elliptic curve. Alice selects a private key „a‟ and generates the public key A=„aG‟ and Bob selects a private key „b‟ and generates the public key B= „bG‟. Encryption: Step 1: Alice chooses a random integer k, and keeps it secret. Step 2: Compute kG. Step 3: Alice selects the Bob‟s public key .bGB  Step 4: Compute .)( lbGkkB  Step 5: Compute .)( mbGaaB  Step 6: Alice wants to send the message iq to Bob. Step 7: Alice wants to convert the message into the points on the elliptic curve. She chooses a point Q, which is the generator of the elliptic curve. By using ASCII characters of upper case letter into the points on the elliptic curve. Let }{ }255................3,2,1{ charactersASCIIallofsetB PPPPA   Alice defines one to one correspondence BAf : by nxnPf )( Where n=1,2………255 and .}..,.........,,{ 255321 charactersASCIIthearexxxx Step 8: To create 44 matrix with entries are the points on the elliptic curve.                16151413 1211109 8765 4321 1 aaaa aaaa aaaa aaaa m and so on additional which is obtained depending upon the length of the message. Step 9: Alice selects ,m where„s‟ is the x- coordinate of m and the binary value„s‟ is secret key. Step 10: Alice define Moore machine with input is secret key. Compute   . 1 1 stateqatoutput kk k matrixadjencyqq   The resultant sets of points are ),(..).........,(),,(),,({ 333222111 iii yxqyxqyxqyxqR  where i=1,2,3…… Step 11: Compute .mlqC ii  . Step 12: Now Alice sends the encrypted message ),( iCkG to Bob. Decryption: To recover the plain text iq from Ci, Bob should do following: Step 1: First Bob selects the Alice public key A=aG. Step 2: Compute bA=b(aG)=m. Step 3: Now Bob computes the inverse element of b(aG) is - b(aG). Step 4: Add - b(aG)to the second part of the message: abGabGkbGqi  = kbGqi  Step 5: Multiply the Bob‟s own private key „b‟ with the first part of the message kG, we get: kbG. Step 6: Now Bob computes the inverse element of kbG, which is –kbG. Step 7: Bob adds -kbG to the second part of the message: ii qkbGkbGq  .
  • 4. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1551 Step 8: after decryption, the obtained points are stored in 44 matrix. ,.... 16151413 1211109 8765 4321 1                qqqq qqqq qqqq qqqq S Step 9: Bob selects m, where„s‟ is the x- coordinate of m which is the secret key and the binary value„s‟ is input key. Step 10: Now Bob multiplies iq with inverse of key matrices „R‟ and Bob applies the reverse process and by using ASCII characters of upper case letters, he can recover the message. EXAMPLE: Alice wants to send the message to Bob using elliptic curve ElGamal encryption by using adjacency matrix. Alice chooses the elliptic curve 432  xy over the field 271z . Then the points on the elliptic curve are E={0,(1,57),(1,214),(2,2),(2,269),(5,11),(5,260 ),(6,36),(6,235),(7,135),(7,136),….. ……………………………………………… ………..................................………………… …………..(264, 174), (269,114), (269,157)}. The number of points on the elliptic curve is 271 and the prime number is 271. Therefore each point is a generator of an elliptic curve E[9][10][11]. Choose the point G=(68,136) on the elliptic curve. Alice selects a private key „a‟=6, and generates the public key A=„aG‟ = 6(68,136)= (85, 199) and Bob selects a private key „b‟=8, and generates the public key B= „bG‟ = 8(68,136)= (122 , 259). Encryption: Step 1: Alice chooses a random integer k =4, and keeps it secret. Step 2: Compute kG= 4(68,136)= (250 , 189). Step 3: Alice selects the Bob‟s public key B=bG= (122, 259). Step 4: Compute kB=k(bG)=4(122 , 259)= (132,248). Step 5: Compute aB=a(bG)=6(122 , 259)= (215,157)=m. Step 6: Alice wants to send the message iq to Bob. Step 7: Alice wants to convert the message into the points on the elliptic curve. She chooses a point Q=(172,240) which is the generator of the elliptic curve. By using ASCII characters, of upper letters into the points on the elliptic curve. 256,259).()240,172(633 55,93),()240,172(622 97,235),()240,172(611 261),,120()240,172(76 64,246),()240,172(65 69,18),()240,172(78 93,5),()240,172(81 38),,183()240,172(73 126,260),()240,172(84 64,246),()240,172(65 69,18),()240,172(78 168,235),()240,172(82 189),,225()240,172(69 126,260),()240,172(84 69,18),()240,172(78 38),,183()240,172(73                 L A N O I T A N R E T N I Then the points are 259)}5,93)(256,(97,235)(5 (120,261),(64,246),(69,18),(93,5),(183,38), (126,260),(64,246),(69,18),(168,235), (225,189),(126,260),(69,38),38),,183{(T Step 8: To create 44 matrix with entries are the points on the elliptic curve.                )259,256()93,55()235,97()261,120( )246,64()18,69()5,93()38,183( )260,126()246,64()18,69()235,168( )189,225()260,126()18,69()38,183( 1m
  • 5. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1552 Step 9: Alice selects ),157,215(m where 215s and the binary value of 215 is 11010111which is input key. Step 10: Alice define Moore machine with input is secret key. And compute 𝑞 𝑘+1 = 𝑞 𝑘 × [𝑎𝑑𝑗𝑒𝑛𝑐𝑦 𝑚𝑎𝑡𝑟𝑖𝑥] 𝑜𝑢𝑡𝑝𝑢𝑡 𝑞 𝑘+1 𝑠𝑡𝑎𝑡𝑒 S. No I/P Previous State Preset State O/P n= O/P+1 Cipher text 1 1 q0 q1 1 2               )244,71()71,228()43,231()100,32( )103,40()103,36()12,164()80,30( )151,153()168,36()168,40()160,251( )226,147()66,260()151,170()258,182( 2 1 q1 q3 3 4               )38,246()244,91()205,48()155,123( )266,93()98,107()25,64()233,183( )51,134()25,64()109,59()132,262( )135,68()23,173()173,107()258,142( 3 0 q3 q2 2 3               )2,56()64,17()253,35()71,151( )95,208()200,228()73,207()198,230( )10,120()214,1()12,122()33,139( )268,60()151,153()235,168()162,159( 4 1 q2 q1 1 2               )60,119()194,258()260,126()170,25( )36,168()244,109()82,67()31,161( )111,38()82,225()36,168()176,133( )239,262()103,40()73,230()248,132( 5 0 q1 q2 2 3               )12,164()13,182()71,228()191,30( )199,85()12,122()171,156()269,2( )248,237()101,88()111,253()51,229( )160,38()23,237()222,135()120,170( 6 1 q2 q1 1 2               )116,192()269,213()168,36()31,161( )168,40()189,67()199,212()5,13( )220,134()214,28()10,43()71,228( )12,256()258,182()141,194()168,195( 7 1 q1 q3 3 4               )205,234()18,167()210,221()214,242( )98,15()160,38()151,153()220,229( )205,260()135,7()210,221()98,107( )222,257()93,185()18,35()116,123(
  • 6. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1553 8 1 q3 q3 3 4               )43,235()222,135()23,237()45,51( )3,60()253,69()49,150()211,80( )261,120()57,1()259,122()238,139( )222,135()120,153()36,168()109,59( Then the points are )}.43,235)(222,135)(23,237( )45,51)(3,60)(253,69)(49,150( )211,80)(261,120)(57,1)(259,122( )238,139)(222,135)(120,153)(36,168)(109,59{(R kbGabGqCComputeStep ii :11 (179,51),(215,157)(132,248))3,60( (226,61),(215,157)(132,248))253,69( (95,210),(215,157)(132,248))49,150( (205,64),(215,157)(132,248))211,80( (19,139),(215,157)(132,248))261,120( (83,100),(215,157)(132,248))57,1( (231,228),(215,157)(132,248))259,122( (230,198),(215,157)(132,248))238,139( (167,253),(215,157)(132,248))222,135( (156,100),(215,157)(132,248))120,153( (120,261),(215,157)(132,248))36,168( (49,207),(215,157)(132,248))109,59( 12 11 10 9 8 7 6 5 4 3 2 1             C C C C C C C C C C C C (119,60).(215,157)(132,248))43,235( ,(157,268))(215,157)(132,248))222,135( (35,18),(215,157)(132,248))23,237( (105,73),(215,157)(132,248))45,51( 16 15 14 13     C C C C Step12: Now Alice sends the encrypted message consisting of pair of points }.(119,60))189),,(250 (167,253))189),,50(35,18))(2189),,(250(105,73))(189),,(250 (179,51))189),,250(226,61))(189),,250(95,210))(189),,(250 (205,64))189),,250(19,139))(189),,250(83,100))(189),,(250 (231,228))189),,(250(230,198))189),,(250(167,253))189),,(250( (156,100))189),,(250(,(120,261))189),,(250((49,207))189),,(250{( to Bob. Decryption: Bob applies the reverse process and recovers the message “INTERNATIONAL123”. VI. Conclusions: In the proposed work, the plain text is converted to points on the elliptic curve by one to one correspondence using ASCII characters. The encryption process uses the finite state machines, adjacency matrices and the key generation process uses the ElGamal encryption taking security, confidentiality, and authenticity into consideration. The obtained cipher text becomes quite difficult to break or to extract the original information even if the algorithm is known. References: [1]. N.Kobliz.Elliptic curve Cryptosystem Mathematics of computation, 48203- 209, 1987. [2]. A text book of Guide to elliptic curve Cryptography by Darrel Hancott Vanstone. [3]. N. Kobliz. Hyper Elliptic Cryptosystem. International Journal of Cryptography, 139-150, 1989. [4]. An introduction to the theory of Elliptic Curves by Joseph H.Silverman brown University and NTRU Cryptosystems. [5]. A text book of Cryptography and Network Security by William Stallings. [6]. Adesh K.Pandey. reprint 2009, “An introduction to automata theory and formal languages S.K.Kararia & sons. New Delhi. [7]. Johan E.Hopcroft, Rajeev Motwin, Jeffrey D.Uiman. “Introduction to automata theory, language, and computation ” Vanstone 3 rd impression, 2007 CRC press, Dorling Kindersley (India)Pvt.Ltd. [8]. http://www.certicom.com/index.php/ecc- tutorial. [9]. P.A.Jyotirmie, B.Ravi Kumar, A.Chandra Sekhar, S.Uma Devi “A One to one Correspondence in elliptic Curve Cryptography” International Journal of Mathematical archive-4(3),2013: 300- 304. [10]. B.krishna Gandhi, A.Chandra Sekhar, S.Srilaksmi. “Cryptography Scheme for Digital Signals using Finite State
  • 7. COMPUSOFT, An international journal of advanced computer technology, 4 (3), March-2015 (Volume-IV, Issue-III) 1554 Machines” International Journal of Computer Applications, September 2011. [11] K.R.Sudha , A.chandra Sekhar ,Prasad Reddy P.V.G.D. “Cryptography Protection of Digital Signals using Some recurrence relations” International Journal of Computer Science and Network security, Vol (7) no 5 may 2007, 203-207. [12] T.ElGamal,“A public-key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, on Information Theory, 469- 472, 1985.