ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS

Volume: 2 Number: 2 July 23, 2016
  • Artan Luma
  • Bujar Raufi
  • Xhemal Zenuni
EN

ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS

Abstract

Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and Ultra Pentor operator from the mentioned parameters

Keywords

References

  1. Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
  2. Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
  3. Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
  4. Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
  5. Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
  6. Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.

Details

Primary Language

English

Subjects

-

Journal Section

-

Authors

Artan Luma This is me
Faculty of Contemporary Sciences and Technologies, South East European University Ilindenska nn, 1200, Tetovo, Macedonia

Bujar Raufi This is me
Faculty of Contemporary Sciences and Technologies, South East European University Ilindenska nn, 1200, Tetovo, Macedonia

Xhemal Zenuni This is me
Faculty of Contemporary Sciences and Technologies, South East European University Ilindenska nn, 1200, Tetovo, Macedonia

Publication Date

July 23, 2016

Submission Date

July 23, 2016

Acceptance Date

-

Published in Issue

Year 2012 Volume: 2 Number: 2

APA
Luma, A., Raufi, B., & Zenuni, X. (2016). ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT, 2(2), 9-12. https://izlik.org/JA72FK63XU
AMA
1.Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. 2016;2(2):9-12. https://izlik.org/JA72FK63XU
Chicago
Luma, Artan, Bujar Raufi, and Xhemal Zenuni. 2016. “ASYMMETRIC ENCRYPTION DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT 2 (2): 9-12. https://izlik.org/JA72FK63XU.
EndNote
Luma A, Raufi B, Zenuni X (July 1, 2016) ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT 2 2 9–12.
IEEE
[1]A. Luma, B. Raufi, and X. Zenuni, “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”, TOJSAT, vol. 2, no. 2, pp. 9–12, July 2016, [Online]. Available: https://izlik.org/JA72FK63XU
ISNAD
Luma, Artan - Raufi, Bujar - Zenuni, Xhemal. “ASYMMETRIC ENCRYPTION DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT 2/2 (July 1, 2016): 9-12. https://izlik.org/JA72FK63XU.
JAMA
1.Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. 2016;2:9–12.
MLA
Luma, Artan, et al. “ASYMMETRIC ENCRYPTION DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT, vol. 2, no. 2, July 2016, pp. 9-12, https://izlik.org/JA72FK63XU.
Vancouver
1.Artan Luma, Bujar Raufi, Xhemal Zenuni. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT [Internet]. 2016 Jul. 1;2(2):9-12. Available from: https://izlik.org/JA72FK63XU