Research Article

On Encryption with Continued Fraction

Volume: 13 Number: 2 June 28, 2022

On Encryption with Continued Fraction

Öz

Many mathematicians have investigated the properties of continued fractions. They made continued fraction expansions of the Pi number, the golden ratio and many more special numbers. With the help of continued fractions, solutions of some Diophantine equations are obtained. In this study, encryption was made using continued fractional expansions of the square root of non-perfect-square integers. Each of the 29 letters in the alphabet is represented by the root of nonperfect square integers starting from 2. Then, continued fraction expansions of the square root of each letter’s number equivalent were calculated. Afterwards, all numbers in the continued fraction expansion were considered as an integer by removing the comma. This information was tabulated for later usage. Each word is considered as individual letters, and a space is left between the encrypted versions of each letter. After the encryption process, the process of deciphering the encrypted text was dealt with. In the deciphering process, since there is a blank between the numbers, the numbers are written as a continued fraction and the integer expansion is calculated. Later, the letter corresponding to this number was found.

Anahtar Kelimeler

References

  1. [1] D. C. Collins, “Continued Fractions,” The MIT Undergraduate J. of Mathematics, vol. 1, pp. 11-20, 1999.
  2. [2] M. Kline, Mathematical Thought from Ancient to Modern Times, New York, USA: Oxford University Press, 1972. [3] Koshy, T., “Fibonacci and Lucas Numbers with Application”, New York, USA: Wiley, 2001.
  3. [4] Brezinski, C., “History of Continued Fractions and Pade Approximants”, Berlin, Germany: Springer-Verlag, 1990.
  4. [5] Ozyılmaz, C., Nallı, A., “Restructuring of Discrete Logarithm Problem and Elgamal Cryptosystem by Using the Power Fibonacci Sequence Module M”, Journal of Science and Arts, ss. 61-70, 2019.
  5. [6] Koblitz, N., “Elliptic Curve Cryptosystems”, Mathematics of Computation, 48, 203-209, 1987.
  6. [7] Basu, M., Prasad, B., “The Generalized Relations Among the Code Elements for Fibonacci Coding Theory”, Chaos Solitons Fractals, 41, no.5, 2517-2525, 2019.
  7. [8] Prajapat, S., Jain, A., Thakur, R. S., “A Novel Approach For Information Security With Automatic Variable Key Using Fibonacci Q-Matrix”, IJCCT 3, no. 3, 54–57, 2012.
  8. [9] Prasad, B., “Coding Theory on Lucas p Numbers”, Discrete Mathematics, Algorithms and Applications, 8, no.4, 2016.

Details

Primary Language

Turkish

Subjects

-

Journal Section

Research Article

Publication Date

June 28, 2022

Submission Date

December 19, 2021

Acceptance Date

March 30, 2022

Published in Issue

Year 2022 Volume: 13 Number: 2

IEEE
[1]M. Güney Duman, “On Encryption with Continued Fraction”, DUJE, vol. 13, no. 2, pp. 149–152, June 2022, doi: 10.24012/dumf.1038230.