BibTex RIS Kaynak Göster

ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS

Yıl 2012, Cilt: 2 Sayı: 2, 9 - 12, 23.07.2016

Öz

Finding new approaches for asymmetric encryption / decryption process represents a milestone in cryptographic research and development. In this paper we introduce new algorithm for asymmetric encryption by utilizing two mathematical operators called Pentors and Ultra Pentors. The public and private key in this algorithm represent a quadruple of parameters which are directly dependent from the above mentioned operators. The strength of the algorithm resides in the inability to find the respective Pentor and Ultra Pentor operator from the mentioned parameters

Kaynakça

  • Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
  • Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
  • Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
  • Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
  • Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
  • Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.
Yıl 2012, Cilt: 2 Sayı: 2, 9 - 12, 23.07.2016

Öz

Kaynakça

  • Diffie, W, & Hellman, M (1998). New directions in cryptography. IEEE Transactions on Information Theory,
  • Luma, A, & Raufi, B (2009). New data encryption algorithm and its implementation for online user authentication. Security and Management, 81-85.
  • Luma, A, & Raufi, B (2010). Relationship between fibonacci and lucas sequences and their application in symmetric cryptosystems.4th International Conference on Circuits, Systems and Signals, 146-150.
  • Luma, A, & Zeqiri, N (2008). Data encryption using an algorithms implemented in RSA algorithm. International Conference in Information Systems Security, 146-149.
  • Mollin, R.A (2007). An Introduction To Cryptography. Chapmann & Hall.
  • Vaudenay, S (2006). Classical introduction to cryptography: Applications for Communications Security. Springer Science & Business Media, Inc.
Toplam 6 adet kaynakça vardır.

Ayrıntılar

Diğer ID JA56SE75VE
Bölüm Makaleler
Yazarlar

Artan Luma Bu kişi benim

Bujar Raufi Bu kişi benim

Xhemal Zenuni Bu kişi benim

Yayımlanma Tarihi 23 Temmuz 2016
Yayımlandığı Sayı Yıl 2012 Cilt: 2 Sayı: 2

Kaynak Göster

APA Luma, A., Raufi, B., & Zenuni, X. (2016). ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT, 2(2), 9-12.
AMA Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. Temmuz 2016;2(2):9-12.
Chicago Luma, Artan, Bujar Raufi, ve Xhemal Zenuni. “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT 2, sy. 2 (Temmuz 2016): 9-12.
EndNote Luma A, Raufi B, Zenuni X (01 Temmuz 2016) ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT 2 2 9–12.
IEEE A. Luma, B. Raufi, ve X. Zenuni, “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”, TOJSAT, c. 2, sy. 2, ss. 9–12, 2016.
ISNAD Luma, Artan vd. “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT 2/2 (Temmuz 2016), 9-12.
JAMA Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. 2016;2:9–12.
MLA Luma, Artan vd. “ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS”. TOJSAT, c. 2, sy. 2, 2016, ss. 9-12.
Vancouver Luma A, Raufi B, Zenuni X. ASYMMETRIC ENCRYPTION / DECRYPTION WITH PENTOR AND ULTRA PENTOR OPERATORS. TOJSAT. 2016;2(2):9-12.