BibTex RIS Cite

ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS

Year 2012, Volume: 2 Issue: 2, 9 - 12, 23.07.2016

Abstract

Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and Ultra Pentor operator from the mentioned parameters

References

  • Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
  • Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
  • Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
  • Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
  • Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
  • Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.
Year 2012, Volume: 2 Issue: 2, 9 - 12, 23.07.2016

Abstract

References

  • Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
  • Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
  • Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
  • Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
  • Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
  • Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.
There are 6 citations in total.

Details

Other ID JA56SE75VE
Journal Section Articles
Authors

Artan Luma This is me

Bujar Raufi This is me

Xhemal Zenuni This is me

Publication Date July 23, 2016
Published in Issue Year 2012 Volume: 2 Issue: 2

Cite

APA Luma, A., Raufi, B., & Zenuni, X. (2016). ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT, 2(2), 9-12.
AMA Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. July 2016;2(2):9-12.
Chicago Luma, Artan, Bujar Raufi, and Xhemal Zenuni. “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT 2, no. 2 (July 2016): 9-12.
EndNote Luma A, Raufi B, Zenuni X (July 1, 2016) ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT 2 2 9–12.
IEEE A. Luma, B. Raufi, and X. Zenuni, “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”, TOJSAT, vol. 2, no. 2, pp. 9–12, 2016.
ISNAD Luma, Artan et al. “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT 2/2 (July 2016), 9-12.
JAMA Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. 2016;2:9–12.
MLA Luma, Artan et al. “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT, vol. 2, no. 2, 2016, pp. 9-12.
Vancouver Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. 2016;2(2):9-12.