ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS
Year 2012,
Volume: 2 Issue: 2, 9 - 12, 23.07.2016
Artan Luma
Bujar Raufi
Xhemal Zenuni
Abstract
Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and Ultra Pentor operator from the mentioned parameters
References
- Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
- Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
- Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
- Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
- Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
- Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.
Year 2012,
Volume: 2 Issue: 2, 9 - 12, 23.07.2016
Artan Luma
Bujar Raufi
Xhemal Zenuni
References
- Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
- Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
- Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
- Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
- Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
- Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.