Cryptography model based on the principles of the geometric Series

Authors

  • Sundus Hatem Majeed Baghdad University , Baghdad ,Iraq

DOI:

https://doi.org/10.29304/jqcm.2021.13.3.851

Keywords:

sequences, attack, cryptography, key

Abstract

Given the rapid advancement of data innovation and the massive volume of data exchanged over the Internet, which needs protection from electronic theft and extortion, there are many encryption algorithms that developed to protect data. Development in the field of coding (Cryptography) has always been accompanied by a development in the field of decoding and Cryptanalysis. This led to the Weakness of many encryption algorithms. Therefore, the need to develop a new methods are necessary. In this paper, a method based on geometric series for encrypting data was proposed, where two keys are used, the amount of the incremental in sequence represents the first key; the number of terms in the sequence represents the second key. The proposed model has been tested using a number of appropriate attack techniques; the proposed model has proved its efficiency and strength against attacks several technique of attacks are applying on the propose model, the results proved that the strength of the proposed method. As a contribution, this paper using a sequence to concatenate the values of the sequence terms to hide the origin character ASCII code which adds fuzzy cryptography to guess the correct ASCII code.

Downloads

Download data is not yet available.

References

[1] Abed, B. N.,Kamil, B. Z., Hameed, M. A., & Abdullah, J. N. (2020, November). Using Cardano's method for solving cubic equation in the cryptosystem to protect data security against Cyber attack. In 2020 2nd Annual International Conference on Information and Sciences (AiCIS) (pp. 127-131). IEEE.‏ 55
[2] Alcock, L., & Simpson, A. (2005). Convergence of sequences and series 2: Interactions between nonvisual reasoning and the learner’s beliefs about their own role. Educational studies in mathematics, 58(1), 77-100.‏ 22
[3] Al-din, B. N., Manasrah, A. M., & Noaman, S. A. (2020). A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography. Webology, 17(2), 817-826.‏ 33
[4] Ansah, R. K., Effah-Poku, S., Addo, D. A., Adjei, B. A., Bawuah, B. K., & Antwi, P. (2018). Relevance of elliptic curve cryptography in modern-day technology. Journal of Mathematical Acumen and Research, 3(2).‏ 77
[5] G. B. Thomas, R. L. Finney, M. D. Weir and F. R. Giordano, "Thomas’ calculus: Addison-Wesley Reading", 2003.
[6] M. Viswanath and M. Ranjithkumar, "A secure cryptosystem using the decimal expansion of an Irrational number", Applied Mathematical Sciences, vol. 9, pp. 5293-5303, 2015.
[7]. Manasrah, A. M., & Al-Din, B. N. (2016). Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study. Security and Communication Networks, 9(11), 1450-1461.‏ 44
[8] Mitali, V. K., & Sharma, A. (2014). A survey on various cryptography techniques. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3(4), 307-312.‏ 11
[9] Noaman, S. A., Abed, B. N. A. D., & Abdul-Kader, S. A. A. (2020, July). A New Mathematical Model to Improve Encryption Process Using Taylor Expansion. In 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA (pp. 35-40). IEEE.‏ 66
[10] O. M. Mendoza, "Taylor series variance estimation for selected indirect demographic estimators", the University of North Carolina at Chapel Hill, 1982.
[11] H. Noman Abed, “Robust and Secured Image Steganography using LSB and Encryption with QR Code”, JQCM, vol. 9, no. 2, pp. Comp 1-9, Aug. 2017.
[12] Z. Fahad Mhawes, “Dihedral Cryptographic Technique”, JQCM, vol. 10, no. 1, pp. Math Page 26 - 31, Jan. 2018.
[13] M. Hasan Abdulameer, “Image Encryption Using Columnar Transportation Technique and Bits Reversing”, JQCM, vol. 10, no. 1, pp. Comp Page 54 - 62, Jan. 2018.
[14] A. M. Abduldaim, “Weak Armendariz Zero Knowledge Cryptosystem”, JQCM, vol. 9, no. 2, pp. Math 1-6, Aug. 2017.\
[15] A. Kareem Wanas and S. Swamy, “Differential Subordination Results for Holomorphic Functions Related to Differential Operator”, JQCM, vol. 11, no. 2, pp. math 46-53, Aug. 2019.

Downloads

Published

2021-10-09

How to Cite

Majeed, S. H. (2021). Cryptography model based on the principles of the geometric Series. Journal of Al-Qadisiyah for Computer Science and Mathematics, 13(3), Comp Page 114 – 121. https://doi.org/10.29304/jqcm.2021.13.3.851

Issue

Section

Computer Articles