Cryptography model based on the principles of the geometric Series
DOI:
https://doi.org/10.29304/jqcm.2021.13.3.851Keywords:
sequences, attack, cryptography, keyAbstract
Given the rapid advancement of data innovation and the massive volume of data exchanged over the Internet, which needs protection from electronic theft and extortion, there are many encryption algorithms that developed to protect data. Development in the field of coding (Cryptography) has always been accompanied by a development in the field of decoding and Cryptanalysis. This led to the Weakness of many encryption algorithms. Therefore, the need to develop a new methods are necessary. In this paper, a method based on geometric series for encrypting data was proposed, where two keys are used, the amount of the incremental in sequence represents the first key; the number of terms in the sequence represents the second key. The proposed model has been tested using a number of appropriate attack techniques; the proposed model has proved its efficiency and strength against attacks several technique of attacks are applying on the propose model, the results proved that the strength of the proposed method. As a contribution, this paper using a sequence to concatenate the values of the sequence terms to hide the origin character ASCII code which adds fuzzy cryptography to guess the correct ASCII code.
Downloads
References
[2] Alcock, L., & Simpson, A. (2005). Convergence of sequences and series 2: Interactions between nonvisual reasoning and the learner’s beliefs about their own role. Educational studies in mathematics, 58(1), 77-100. 22
[3] Al-din, B. N., Manasrah, A. M., & Noaman, S. A. (2020). A Novel Approach by Using a New Algorithm: Wolf Algorithm as a New Technique in Cryptography. Webology, 17(2), 817-826. 33
[4] Ansah, R. K., Effah-Poku, S., Addo, D. A., Adjei, B. A., Bawuah, B. K., & Antwi, P. (2018). Relevance of elliptic curve cryptography in modern-day technology. Journal of Mathematical Acumen and Research, 3(2). 77
[5] G. B. Thomas, R. L. Finney, M. D. Weir and F. R. Giordano, "Thomas’ calculus: Addison-Wesley Reading", 2003.
[6] M. Viswanath and M. Ranjithkumar, "A secure cryptosystem using the decimal expansion of an Irrational number", Applied Mathematical Sciences, vol. 9, pp. 5293-5303, 2015.
[7]. Manasrah, A. M., & Al-Din, B. N. (2016). Mapping private keys into one public key using binary matrices and masonic cipher: Caesar cipher as a case study. Security and Communication Networks, 9(11), 1450-1461. 44
[8] Mitali, V. K., & Sharma, A. (2014). A survey on various cryptography techniques. International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), 3(4), 307-312. 11
[9] Noaman, S. A., Abed, B. N. A. D., & Abdul-Kader, S. A. A. (2020, July). A New Mathematical Model to Improve Encryption Process Using Taylor Expansion. In 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA (pp. 35-40). IEEE. 66
[10] O. M. Mendoza, "Taylor series variance estimation for selected indirect demographic estimators", the University of North Carolina at Chapel Hill, 1982.
[11] H. Noman Abed, “Robust and Secured Image Steganography using LSB and Encryption with QR Code”, JQCM, vol. 9, no. 2, pp. Comp 1-9, Aug. 2017.
[12] Z. Fahad Mhawes, “Dihedral Cryptographic Technique”, JQCM, vol. 10, no. 1, pp. Math Page 26 - 31, Jan. 2018.
[13] M. Hasan Abdulameer, “Image Encryption Using Columnar Transportation Technique and Bits Reversing”, JQCM, vol. 10, no. 1, pp. Comp Page 54 - 62, Jan. 2018.
[14] A. M. Abduldaim, “Weak Armendariz Zero Knowledge Cryptosystem”, JQCM, vol. 9, no. 2, pp. Math 1-6, Aug. 2017.\
[15] A. Kareem Wanas and S. Swamy, “Differential Subordination Results for Holomorphic Functions Related to Differential Operator”, JQCM, vol. 11, no. 2, pp. math 46-53, Aug. 2019.