SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 1 Issue 1 ǁ May. 2013 ǁ PP.17-20
www.ijres.org 17 | Page
An Identity Based Encryption Scheme based on Pell’s
Equation With Jacobi Symbol
1
Kondala Rao M, 2
K V S S R S S Sarma, 3
P S Avadhani
1
Department of Computer Science and Systems Engineering, Andhra University, India,
2
Department of Computer Information Science, University of Hyderabad, Hyderabad, India,
3
Department of Computer Science and Systems Engineering Andhra University, Visakhapatnam, India,
Abstract:- In this paper, we propose a novel public key cryptosystem in which the public key of a
subscriber can be chosen to be a publicly known value, such as his identity. Identity based encryption
scheme developed is a public key cryptosystem and it is based on Pell’s equation. This paper
demonstrates algorithms for key generation, encryption and decryption based on Pell’s equation with
Jacobi symbol.
Keywords:- pells equation, Legendre symbol, Jacobi symbol, permanent private secret.
I. INTRODUCTION
In an offline public key system, in order to send encrypted data it is necessary to know the public key
of the recipient. This usually necessitates the holding of directories of public keys. In an identity based system a
user’s public key is a function of his identity (for example his email address), thus avoiding the need for a
separate public key directory. The possibility of such a system was first mentioned by Shamir[4]. But it has
proved difficult to find implementations that are both practical and secure, although recently an implementation
based on elliptic curves has been proposed[3]. This paper describes an identity based cryptosystem which uses
Pell’s equation.
The system has an authority which generates a universally available public M. This modulus is a
product of two primes p and q held privately by the authority. Also, the system will make use of a universally
available secure hash function. Then, if user Alice wishes to register in order to be able to receive encrypted data
she presents her identity (e.g. email address) to the authority. In return she will be given a private key with
properties. A user Bob who wishes to send encrypted data to Alice will be able to do this knowing only Alice’s
public identity and the universal system parameters. There is no need for a public key directory.
There were some methods developed in which administer verifies the information, such as RSA. In
recent years, because of the development of public key cryptography functions, a new method of verification is
accordingly being created. When comparing RSA with Pell’s Equation, Proposed scheme is more secure and
faster than RSA Public Key Cryptography to achieve the same level of security as Pell’s Equation.
II. PROPOSED SCHEME
1.1 Pell’s equation based encryption system
Our scheme is based on Pell’s equation, and to begin with, we briefly introduced this scheme. We can
divide Pell’s schemes into four parts, Pell’s equation, Key Management, Encryption and Decryption. This
scheme also needs a trusted third party can decide the contents of the published information, whereas others can
only download without permission to modify it.
1.2 Pell’s Equation
In number theory, for any constant integer D the equation x2
−D y2
≡ 1 is called the Pell’s equation[1].
This has many applications in various branches of science. The set of all pairs(x, y) describes cyclic group Gp
over the Pell’s equation x2
−D y2
≡ 1 (mod P), where P is an odd prime.
The properties are also found in the group GN over the Pell’s equation x2
−D y2
≡ 1 (mod N), where N is a
product of two primes. This group GN then developed to be a public key crypto scheme based on Pell’s
equations over the ring ZN
*
.
From the group GN, we find a group isomorphism mapping f : GN → ZN
*
such that a solution (x, y) of
the Pell’s equation x2
− D y2
≡ 1 (mod N), can easily be transformed to unique element u in ZN
*
. This implies
that the plain texts/cipher texts in the in the group GN can easily transformed to the corresponding plain
texts/cipher texts in the RSA scheme[2].
An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
www.ijres.org 18 | Page
Let p be an odd prime and D be a non zero quadratic residue element modulo p, which we denote if
with Fp. Gp the set of solutions (x, y)  Fp  Fp to the Pell equation
x
2
− D y
2
 1 (mod P).
We then define an addition operation “  “ on Gp as follows.
If two pairs ( 1x , 1y ), ( 2x , 2y )  Gp, then the third pair ( 3x , 3y ) can be computed as
( 3x , 3y )  ( 1x , 1y )  ( 2x , 2y )
 ( 1x 2x + D 1y 2y , 1x 2y + 2x 1y ) (mod P).
It is easy to verify that the Gp together with the operation “  “ is an abelian group with the identity
element by (1, 0) and the inverse of the element (x, y) by (x,-y). Further it can be proved that <Gp,  > is a
cyclic group of order p-1. Now we want to prove that the group Gp is isomorphic to Fp*, Where Fp*, is all non-
zero elements of Fp denotes a multiplicative group of Fp.
Theorem1:
Gp together with the operation “  “ is a cyclic group of order p-1. Now we want to prove that the group Gp is
isomorphic to Fp
*
, where Fp
*
denotes a multiplicative group of Fp.
Theorem2:
Two groups Gp and Fp
*
are isomorphic Now we define another operation “  ” as follows :
( , ) ( , ) ( , ) ......... ( , )i x y x y x y x y     i times over Gp
.
If ( ix , y i ) = i  ( ix , y i ) , we expand the above expression and have
ix =
0 k i
kiseven
 
 ( i
k )D
/2k  
x i-k
yk
;
iy =
0 k i
kisodd
 
 ( i
k )D
/2k  
x i-k
yk
According to the definition of the mapping f, we have
f (( ix , y i ))  ix - a iy

0 k i
kiseven
 
 ( i
k )D
/2k  
x i-k
yk
- a
0 k i
kisodd
 
 ( i
k )D
/2k  
x i-k
yk

0 k i
kiseven
 
 ( i
k )D
/2k  
x i-k
yk
+
0 k i
kisodd
 
 ( i
k )D
/2k  
x i-k
(–a y)k
 (x-ay)i
Because Gp is a cyclic group of order p-1, we have that if k  1 (mod P-1), then
(x,y) = k  (x, y), for all (x, y)  Gp
Let N be a product of two large primes p and q. Zn
*
denotes a multiplicative group of ZN. From the above
theorem, it is easy to develop the following theorem.
Theorem3:
The mapping f : GN  ZN
*
satisfying f ((1,0))  ( 1 mod N ), f ((x, y))  x - ay (mod N), where (x, y) 
GN and a2
 D (mod N), is a group isomorphism . Its inverse mapping f -1
(1)  (1,0) (mod N), f -1
(u)  ((u
+ u-1
)/2, (u-1
- u)/2a (mod N), where u  ZN
*
.
Theorem 4:
If ( iX , y i ) = i  (x, y), over GN , we have ix - a iy ≡ (x - ay)i
( mod N).
Theorem 5:
If k ≡ 1 mod (l .c .m (p-1, q-1)), we have (x, y) = k  (x, y), for all (x, y)  GN.
An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
www.ijres.org 19 | Page
Legendre symbol
Let a be an integer and p > 2 a prime, Define the Legendre Symbol (a/p)=0,1,-1 as follows
a
p
=
0 if p divides a
1 if a is QR mod p
−1 if a NQR mod p
Jacobi Symbol
If p is a positive odd integer with prime factorization
P =
1
r
i
 pi
ai
.
The Jacobi symbol ( n / p) is defined for all integers n by the equation
( n / p) =
1
r
i
 (n / pi)ai
where (n / pi) is the legendre symbol.
1.3 Key Management
In this step, the Bob chooses the Secrete Key Generation[5], and computes and publishes some
auxiliary information on the bulletin. The Bob will perform the following steps:
1.3.1 Key Generation:
Assume that the Bob to send messages E (cipher text) and Alice case receive the messages E and M.
1. The Bob chooses two primes p and q (p  q)
2. The Bob compute
p
 = p mod 4 and
q
 =q mod 4 where
p
 ,
q
  {1,-1}
3. The Bob find non square integer D > 0 such that Legender symbols
(D/p) = -
p
 and (D/p) = -
q

4. The Bob compute n = p * q and m= (p+
p
 ) (q+
q
 ) / 4
5.
The Bob select a integer value for S such that the jacobi symbol
( ( S2
- D)/n) = -1. As there are closely to ( ) / 2n  such values of S.
6. The Bob select a integer value for e such that ( e, m ) =1. and makes {n, e, S, D} as public.
7. The Bob compute d * e  (m+1)/2 mod m for d and keeps as private key
8. D is Key for the Cipher Text.
1.4 Encryption:
The Bob changes the messages M to E.
1. The Bob get the M be a message to communicate / encrypt
2. The Bob compute j1 = (M2
-D)/n
3. The Bob compare If j1 = 1 go to step (4) else go to step (6)
4. The Bob compute x  (M2
+D) / ( M2
-D) (mod n )
And y  2M / (M2
-D) (mod n)
5. Go to step (8)
6. The Bob compare If j1 = -1 go to step (7) else go to stop().
7. The Bob compute x  ((M2
+D)(S2
+ D) + 4DMS) / (( M2
-D) (S2
- D) ) (mod n )
And y  (2S (M2
+D) + 2M (S2
+ D)) / (( M2
-D) (S2
- D) ) (mod n )
8. The Bob compute j2 = x (mod 2) where j2 {0, 1}
(nothing that x2
- Dy2
=1(mod n) for these values of x,
y and assume
that (y, n) =1)
9. The Bob Put Xl = x and Yl = y
10. The Bob compute (Xl+1, Xl) (mod n ) such that
if i  j
An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
www.ijres.org 20 | Page
Xi+j = Xj + D Yi Yj and Yi+j = Xi Yj + Xj Yi
if i = j
X2i = Xi
2
+D Yi
2
or 2 Xi
2
– 1 and Y2i = 2 Xi Yi
11. The Bob compute E = DYXl (Xl+1 – x Xl)-1
mod n (here E is the cipher text) with 0<E<n
12. Send the {E, j1, j2 ) = cipher text.
1.5 Decryption
After receiving the ciphertext (E, j1,j2), the Alice checks that x2
−D y2
≡ 1
If yes, Alice can continue
1. The Alice compute
X2l = (E2
+ D) / (E2
- D) (mod n) and
i. Y2l = (2E / (E2
- D)) (mod n )
2. The Alice compute Xd (X2e)  X2de (x)(mod n) and
i. Xd+1 (X2e)  X2de+2e (x)(mod n)
ii. We have X2ed =  x (mod n) and j2  x (mod 2)
3. The Alice compute  and therefore determines x (mod n)
And find y   Y 2de   (X2de+2e - X2e Xd ) / DX2e mod n
we have t  x + y D mod n
Compute t1
such that
t1
= t if j1 = 1 else if j1 = -1
t1
= t (S- D ) / (S + D )
And t1
= (M + D ) / (M - D ) mod n
4. The Alice compute
M  (t1
+1) ( D ) / ( t1
-1) (mod n)
The Bob sends message (M) to key generation function that produces a secure private key (D). This
private key is then encrypted with public key cryptosystem using the Bob’s private key to form the result. Both
the message and the result are prepended and then transmitted. The Alice takes the message (M) and produces a
secure private key (D). The Alice also decrypts the result using the Bob’s public key. If the calculated secure
private key (D) matches the decrypted results, the result is accepted as valid. Because only the Bob knows the
private key and only the Bob could have produced a valid result.
III. CONCLUSION
In this paper, we have proposed an Identity based encryption scheme using Pell’s equation with
Legendre and Jacobi symbols. This scheme is a multi-use scheme, which means every Alice only needs to keep
one private secrete. The Alice just use the public information and their own private information to get the
information back. When then identity is changed, the Bob only needs to adjust the private key. And one of the
benefits of this scheme is that the Bob will not ask for some extra information from all the Alice while in the
information updating stage. We also show how to verify the information which comes from other Alice.
Furthermore, because this scheme is constructed on the pells equation, we attain a much higher level of security
comparing with the original public key problem in the same bits length.
REFERENCES
[1]. Chen C.Y., Chang C.C. Yang W.P.,"Fast RSA type cryptosystem based on Pell equation”, Proceeding
of International Conf. On Cryptology and Information Security Taiwan, Dec.1-5, 1996
[2]. C Cocks Split “Generation of RSA Parameters with multiple participants” proceeding of 6th
IMA
conference on Cryptography and Coding, Spring LNCS 1355.
[3]. A. Shamir, “Identity- Based Cryptosystems and Signature schemes advances in Cryptology” –
Proceeding of Crypto’84.
[4]. D. Boneh and M. Franklin, “Identity-based encryption from the Weil paring,” Advances in Cryptology-
Crypto’2001, Lecture Notes on Computer Science 2139, Springer-Verlag (2001), pp.213-229.
[5]. Michael J.JacobSon and Jr.Hugh C.Williams 2009 “Solving the Pell Equation”, pages 353-359.

Weitere ähnliche Inhalte

Was ist angesagt?

Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsmvde3000
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2Coleman Gorham
 
Unification and Refactoring of Clones
Unification and Refactoring of ClonesUnification and Refactoring of Clones
Unification and Refactoring of ClonesNikolaos Tsantalis
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA EncryptionNathan F. Dunn
 
Pragmatic metaprogramming
Pragmatic metaprogrammingPragmatic metaprogramming
Pragmatic metaprogrammingMårten Rånge
 
The Ring programming language version 1.4.1 book - Part 29 of 31
The Ring programming language version 1.4.1 book - Part 29 of 31The Ring programming language version 1.4.1 book - Part 29 of 31
The Ring programming language version 1.4.1 book - Part 29 of 31Mahmoud Samir Fayed
 
A New Signature Protocol Based on RSA and Elgamal Scheme
A New Signature Protocol Based on RSA and Elgamal SchemeA New Signature Protocol Based on RSA and Elgamal Scheme
A New Signature Protocol Based on RSA and Elgamal SchemeZac Darcy
 
Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]Palak Sanghani
 
Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key AlgorithmsBit Hacker
 
Introduction to Deep Neural Network
Introduction to Deep Neural NetworkIntroduction to Deep Neural Network
Introduction to Deep Neural NetworkLiwei Ren任力偉
 

Was ist angesagt? (18)

Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...
 
G029037043
G029037043G029037043
G029037043
 
Crack Wep Wifi Under100seconds
Crack Wep Wifi Under100secondsCrack Wep Wifi Under100seconds
Crack Wep Wifi Under100seconds
 
07slide
07slide07slide
07slide
 
RSA final notation change2
RSA final notation change2RSA final notation change2
RSA final notation change2
 
Unification and Refactoring of Clones
Unification and Refactoring of ClonesUnification and Refactoring of Clones
Unification and Refactoring of Clones
 
Class method
Class methodClass method
Class method
 
deep learning
deep learningdeep learning
deep learning
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
algorithm_analysis1
algorithm_analysis1algorithm_analysis1
algorithm_analysis1
 
The Mathematics of RSA Encryption
The Mathematics of RSA EncryptionThe Mathematics of RSA Encryption
The Mathematics of RSA Encryption
 
Pragmatic metaprogramming
Pragmatic metaprogrammingPragmatic metaprogramming
Pragmatic metaprogramming
 
The Ring programming language version 1.4.1 book - Part 29 of 31
The Ring programming language version 1.4.1 book - Part 29 of 31The Ring programming language version 1.4.1 book - Part 29 of 31
The Ring programming language version 1.4.1 book - Part 29 of 31
 
A New Signature Protocol Based on RSA and Elgamal Scheme
A New Signature Protocol Based on RSA and Elgamal SchemeA New Signature Protocol Based on RSA and Elgamal Scheme
A New Signature Protocol Based on RSA and Elgamal Scheme
 
Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]Lec 9 05_sept [compatibility mode]
Lec 9 05_sept [compatibility mode]
 
Rsa documentation
Rsa documentationRsa documentation
Rsa documentation
 
Public Key Algorithms
Public Key AlgorithmsPublic Key Algorithms
Public Key Algorithms
 
Introduction to Deep Neural Network
Introduction to Deep Neural NetworkIntroduction to Deep Neural Network
Introduction to Deep Neural Network
 

Andere mochten auch

Infografia pedro escalona
Infografia pedro escalonaInfografia pedro escalona
Infografia pedro escalonaescalonave
 
Calendário de eventos - Junho | Julho
Calendário de eventos - Junho | JulhoCalendário de eventos - Junho | Julho
Calendário de eventos - Junho | JulhoTREND Operadora
 
Certificate Securitas
Certificate SecuritasCertificate Securitas
Certificate SecuritasMichal Durik
 
Elpc wind energy_supply_chain_in_il_brochure-2010
Elpc wind energy_supply_chain_in_il_brochure-2010Elpc wind energy_supply_chain_in_il_brochure-2010
Elpc wind energy_supply_chain_in_il_brochure-2010Debi Myers
 
Presentación (Villarrica)
Presentación (Villarrica)Presentación (Villarrica)
Presentación (Villarrica)Brunoaraujolopez
 
LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...
LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...
LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...Jose Mari Luzarraga
 
Sistemas Operativos
Sistemas OperativosSistemas Operativos
Sistemas OperativosEva Puig
 
Proyecto Vedruna-Albania
Proyecto Vedruna-AlbaniaProyecto Vedruna-Albania
Proyecto Vedruna-AlbaniaMaribelCarmen
 
Top 10 Internet Trends 2007
Top 10 Internet Trends 2007Top 10 Internet Trends 2007
Top 10 Internet Trends 2007Jürg Stuker
 
CORPORATE FINANCIAL MANAGEMENT_REVA
CORPORATE FINANCIAL MANAGEMENT_REVACORPORATE FINANCIAL MANAGEMENT_REVA
CORPORATE FINANCIAL MANAGEMENT_REVABaşar Onur Mesci
 
Futuro para los Bancos del Tiempo: Cooperación y reciprocidad
Futuro para los Bancos del Tiempo: Cooperación y reciprocidadFuturo para los Bancos del Tiempo: Cooperación y reciprocidad
Futuro para los Bancos del Tiempo: Cooperación y reciprocidadElvira Méndez Méndez
 
Redes sociales
Redes socialesRedes sociales
Redes socialesSan Quiqui
 

Andere mochten auch (20)

Infografia pedro escalona
Infografia pedro escalonaInfografia pedro escalona
Infografia pedro escalona
 
Calendário de eventos - Junho | Julho
Calendário de eventos - Junho | JulhoCalendário de eventos - Junho | Julho
Calendário de eventos - Junho | Julho
 
Yale-Tulane ESF-8 MOC Report - Hurricane Sandy - 11 NOV 2012
Yale-Tulane ESF-8 MOC Report - Hurricane Sandy - 11 NOV 2012Yale-Tulane ESF-8 MOC Report - Hurricane Sandy - 11 NOV 2012
Yale-Tulane ESF-8 MOC Report - Hurricane Sandy - 11 NOV 2012
 
Certificate Securitas
Certificate SecuritasCertificate Securitas
Certificate Securitas
 
No esta titulada aun.
No esta titulada aun.No esta titulada aun.
No esta titulada aun.
 
Elpc wind energy_supply_chain_in_il_brochure-2010
Elpc wind energy_supply_chain_in_il_brochure-2010Elpc wind energy_supply_chain_in_il_brochure-2010
Elpc wind energy_supply_chain_in_il_brochure-2010
 
Bbs Industrial
Bbs IndustrialBbs Industrial
Bbs Industrial
 
Presentación (Villarrica)
Presentación (Villarrica)Presentación (Villarrica)
Presentación (Villarrica)
 
LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...
LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...
LA EMPRESA VASCA ANTE LA GLOBALIZACION: OPORTUNIDAD O NECESIDAD?” Claves de l...
 
Recuerdos Inolvidables
Recuerdos InolvidablesRecuerdos Inolvidables
Recuerdos Inolvidables
 
Sistemas Operativos
Sistemas OperativosSistemas Operativos
Sistemas Operativos
 
Zxm2
Zxm2Zxm2
Zxm2
 
Proyecto Vedruna-Albania
Proyecto Vedruna-AlbaniaProyecto Vedruna-Albania
Proyecto Vedruna-Albania
 
El Lado Oscuro De La Noche
El Lado Oscuro De La NocheEl Lado Oscuro De La Noche
El Lado Oscuro De La Noche
 
Redes sociales dennis
Redes sociales dennisRedes sociales dennis
Redes sociales dennis
 
Top 10 Internet Trends 2007
Top 10 Internet Trends 2007Top 10 Internet Trends 2007
Top 10 Internet Trends 2007
 
CORPORATE FINANCIAL MANAGEMENT_REVA
CORPORATE FINANCIAL MANAGEMENT_REVACORPORATE FINANCIAL MANAGEMENT_REVA
CORPORATE FINANCIAL MANAGEMENT_REVA
 
Futuro para los Bancos del Tiempo: Cooperación y reciprocidad
Futuro para los Bancos del Tiempo: Cooperación y reciprocidadFuturo para los Bancos del Tiempo: Cooperación y reciprocidad
Futuro para los Bancos del Tiempo: Cooperación y reciprocidad
 
Redes sociales
Redes socialesRedes sociales
Redes sociales
 
Actos motores
Actos motoresActos motores
Actos motores
 

Ähnlich wie D0111720

On theory and applications of mathematics to security in cloud computing: a c...
On theory and applications of mathematics to security in cloud computing: a c...On theory and applications of mathematics to security in cloud computing: a c...
On theory and applications of mathematics to security in cloud computing: a c...Dr. Richard Otieno
 
Regression on gaussian symbols
Regression on gaussian symbolsRegression on gaussian symbols
Regression on gaussian symbolsAxel de Romblay
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaSoham Mondal
 
On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysDharmalingam Ganesan
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2Fahad Layth
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key CryptographyAbhijit Mondal
 
[DL輪読会]Conditional Neural Processes
[DL輪読会]Conditional Neural Processes[DL輪読会]Conditional Neural Processes
[DL輪読会]Conditional Neural ProcessesDeep Learning JP
 
Conditional neural processes
Conditional neural processesConditional neural processes
Conditional neural processesKazuki Fujikawa
 
Large Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfLarge Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfDr. Richard Otieno
 
The 2 Goldbach's Conjectures with Proof
The 2 Goldbach's Conjectures with Proof The 2 Goldbach's Conjectures with Proof
The 2 Goldbach's Conjectures with Proof nikos mantzakouras
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentationSoham Mondal
 
Construction of BIBD’s Using Quadratic Residues
Construction of BIBD’s Using Quadratic ResiduesConstruction of BIBD’s Using Quadratic Residues
Construction of BIBD’s Using Quadratic Residuesiosrjce
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3Coleman Gorham
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and SteganographyMohammad Amin Amjadi
 
Fixed point result in menger space with ea property
Fixed point result in menger space with ea propertyFixed point result in menger space with ea property
Fixed point result in menger space with ea propertyAlexander Decker
 

Ähnlich wie D0111720 (20)

C0211822
C0211822C0211822
C0211822
 
1508.07756v1
1508.07756v11508.07756v1
1508.07756v1
 
On theory and applications of mathematics to security in cloud computing: a c...
On theory and applications of mathematics to security in cloud computing: a c...On theory and applications of mathematics to security in cloud computing: a c...
On theory and applications of mathematics to security in cloud computing: a c...
 
Regression on gaussian symbols
Regression on gaussian symbolsRegression on gaussian symbols
Regression on gaussian symbols
 
5320
53205320
5320
 
Ecc2
Ecc2Ecc2
Ecc2
 
Novel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsaNovel encryption algorithm and software development ecc and rsa
Novel encryption algorithm and software development ecc and rsa
 
On the Secrecy of RSA Private Keys
On the Secrecy of RSA Private KeysOn the Secrecy of RSA Private Keys
On the Secrecy of RSA Private Keys
 
RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2RSA-W7(rsa) d1-d2
RSA-W7(rsa) d1-d2
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
[DL輪読会]Conditional Neural Processes
[DL輪読会]Conditional Neural Processes[DL輪読会]Conditional Neural Processes
[DL輪読会]Conditional Neural Processes
 
Conditional neural processes
Conditional neural processesConditional neural processes
Conditional neural processes
 
Rsa cryptosystem
Rsa cryptosystemRsa cryptosystem
Rsa cryptosystem
 
Large Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdfLarge Semi Primes Factorization with Its Implications to RSA.pdf
Large Semi Primes Factorization with Its Implications to RSA.pdf
 
The 2 Goldbach's Conjectures with Proof
The 2 Goldbach's Conjectures with Proof The 2 Goldbach's Conjectures with Proof
The 2 Goldbach's Conjectures with Proof
 
Convolution presentation
Convolution presentationConvolution presentation
Convolution presentation
 
Construction of BIBD’s Using Quadratic Residues
Construction of BIBD’s Using Quadratic ResiduesConstruction of BIBD’s Using Quadratic Residues
Construction of BIBD’s Using Quadratic Residues
 
Senior Research Final Draft3
Senior Research Final Draft3Senior Research Final Draft3
Senior Research Final Draft3
 
Image Cryptography and Steganography
Image Cryptography and SteganographyImage Cryptography and Steganography
Image Cryptography and Steganography
 
Fixed point result in menger space with ea property
Fixed point result in menger space with ea propertyFixed point result in menger space with ea property
Fixed point result in menger space with ea property
 

Mehr von IJRES Journal

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresIJRES Journal
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
 

Mehr von IJRES Journal (20)

Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...Exploratory study on the use of crushed cockle shell as partial sand replacem...
Exploratory study on the use of crushed cockle shell as partial sand replacem...
 
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...
 
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityReview: Nonlinear Techniques for Analysis of Heart Rate Variability
Review: Nonlinear Techniques for Analysis of Heart Rate Variability
 
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...
 
Study and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil propertiesStudy and evaluation for different types of Sudanese crude oil properties
Study and evaluation for different types of Sudanese crude oil properties
 
A Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their StructuresA Short Report on Different Wavelets and Their Structures
A Short Report on Different Wavelets and Their Structures
 
A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...A Case Study on Academic Services Application Using Agile Methodology for Mob...
A Case Study on Academic Services Application Using Agile Methodology for Mob...
 
Wear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible RodWear Analysis on Cylindrical Cam with Flexible Rod
Wear Analysis on Cylindrical Cam with Flexible Rod
 
DDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and DetectionDDOS Attacks-A Stealthy Way of Implementation and Detection
DDOS Attacks-A Stealthy Way of Implementation and Detection
 
An improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioningAn improved fading Kalman filter in the application of BDS dynamic positioning
An improved fading Kalman filter in the application of BDS dynamic positioning
 
Positioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision WorkbenchPositioning Error Analysis and Compensation of Differential Precision Workbench
Positioning Error Analysis and Compensation of Differential Precision Workbench
 
Status of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and NowStatus of Heavy metal pollution in Mithi river: Then and Now
Status of Heavy metal pollution in Mithi river: Then and Now
 
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...
 
Experimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirsExperimental study on critical closing pressure of mudstone fractured reservoirs
Experimental study on critical closing pressure of mudstone fractured reservoirs
 
Correlation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound SignalCorrelation Analysis of Tool Wear and Cutting Sound Signal
Correlation Analysis of Tool Wear and Cutting Sound Signal
 
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...
 
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...
 
A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...A novel high-precision curvature-compensated CMOS bandgap reference without u...
A novel high-precision curvature-compensated CMOS bandgap reference without u...
 
Structural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubesStructural aspect on carbon dioxide capture in nanotubes
Structural aspect on carbon dioxide capture in nanotubes
 
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...Thesummaryabout fuzzy control parameters selected based on brake driver inten...
Thesummaryabout fuzzy control parameters selected based on brake driver inten...
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 

D0111720

  • 1. International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Print): 2320-9356 www.ijres.org Volume 1 Issue 1 ǁ May. 2013 ǁ PP.17-20 www.ijres.org 17 | Page An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol 1 Kondala Rao M, 2 K V S S R S S Sarma, 3 P S Avadhani 1 Department of Computer Science and Systems Engineering, Andhra University, India, 2 Department of Computer Information Science, University of Hyderabad, Hyderabad, India, 3 Department of Computer Science and Systems Engineering Andhra University, Visakhapatnam, India, Abstract:- In this paper, we propose a novel public key cryptosystem in which the public key of a subscriber can be chosen to be a publicly known value, such as his identity. Identity based encryption scheme developed is a public key cryptosystem and it is based on Pell’s equation. This paper demonstrates algorithms for key generation, encryption and decryption based on Pell’s equation with Jacobi symbol. Keywords:- pells equation, Legendre symbol, Jacobi symbol, permanent private secret. I. INTRODUCTION In an offline public key system, in order to send encrypted data it is necessary to know the public key of the recipient. This usually necessitates the holding of directories of public keys. In an identity based system a user’s public key is a function of his identity (for example his email address), thus avoiding the need for a separate public key directory. The possibility of such a system was first mentioned by Shamir[4]. But it has proved difficult to find implementations that are both practical and secure, although recently an implementation based on elliptic curves has been proposed[3]. This paper describes an identity based cryptosystem which uses Pell’s equation. The system has an authority which generates a universally available public M. This modulus is a product of two primes p and q held privately by the authority. Also, the system will make use of a universally available secure hash function. Then, if user Alice wishes to register in order to be able to receive encrypted data she presents her identity (e.g. email address) to the authority. In return she will be given a private key with properties. A user Bob who wishes to send encrypted data to Alice will be able to do this knowing only Alice’s public identity and the universal system parameters. There is no need for a public key directory. There were some methods developed in which administer verifies the information, such as RSA. In recent years, because of the development of public key cryptography functions, a new method of verification is accordingly being created. When comparing RSA with Pell’s Equation, Proposed scheme is more secure and faster than RSA Public Key Cryptography to achieve the same level of security as Pell’s Equation. II. PROPOSED SCHEME 1.1 Pell’s equation based encryption system Our scheme is based on Pell’s equation, and to begin with, we briefly introduced this scheme. We can divide Pell’s schemes into four parts, Pell’s equation, Key Management, Encryption and Decryption. This scheme also needs a trusted third party can decide the contents of the published information, whereas others can only download without permission to modify it. 1.2 Pell’s Equation In number theory, for any constant integer D the equation x2 −D y2 ≡ 1 is called the Pell’s equation[1]. This has many applications in various branches of science. The set of all pairs(x, y) describes cyclic group Gp over the Pell’s equation x2 −D y2 ≡ 1 (mod P), where P is an odd prime. The properties are also found in the group GN over the Pell’s equation x2 −D y2 ≡ 1 (mod N), where N is a product of two primes. This group GN then developed to be a public key crypto scheme based on Pell’s equations over the ring ZN * . From the group GN, we find a group isomorphism mapping f : GN → ZN * such that a solution (x, y) of the Pell’s equation x2 − D y2 ≡ 1 (mod N), can easily be transformed to unique element u in ZN * . This implies that the plain texts/cipher texts in the in the group GN can easily transformed to the corresponding plain texts/cipher texts in the RSA scheme[2].
  • 2. An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol www.ijres.org 18 | Page Let p be an odd prime and D be a non zero quadratic residue element modulo p, which we denote if with Fp. Gp the set of solutions (x, y)  Fp  Fp to the Pell equation x 2 − D y 2  1 (mod P). We then define an addition operation “  “ on Gp as follows. If two pairs ( 1x , 1y ), ( 2x , 2y )  Gp, then the third pair ( 3x , 3y ) can be computed as ( 3x , 3y )  ( 1x , 1y )  ( 2x , 2y )  ( 1x 2x + D 1y 2y , 1x 2y + 2x 1y ) (mod P). It is easy to verify that the Gp together with the operation “  “ is an abelian group with the identity element by (1, 0) and the inverse of the element (x, y) by (x,-y). Further it can be proved that <Gp,  > is a cyclic group of order p-1. Now we want to prove that the group Gp is isomorphic to Fp*, Where Fp*, is all non- zero elements of Fp denotes a multiplicative group of Fp. Theorem1: Gp together with the operation “  “ is a cyclic group of order p-1. Now we want to prove that the group Gp is isomorphic to Fp * , where Fp * denotes a multiplicative group of Fp. Theorem2: Two groups Gp and Fp * are isomorphic Now we define another operation “  ” as follows : ( , ) ( , ) ( , ) ......... ( , )i x y x y x y x y     i times over Gp . If ( ix , y i ) = i  ( ix , y i ) , we expand the above expression and have ix = 0 k i kiseven    ( i k )D /2k   x i-k yk ; iy = 0 k i kisodd    ( i k )D /2k   x i-k yk According to the definition of the mapping f, we have f (( ix , y i ))  ix - a iy  0 k i kiseven    ( i k )D /2k   x i-k yk - a 0 k i kisodd    ( i k )D /2k   x i-k yk  0 k i kiseven    ( i k )D /2k   x i-k yk + 0 k i kisodd    ( i k )D /2k   x i-k (–a y)k  (x-ay)i Because Gp is a cyclic group of order p-1, we have that if k  1 (mod P-1), then (x,y) = k  (x, y), for all (x, y)  Gp Let N be a product of two large primes p and q. Zn * denotes a multiplicative group of ZN. From the above theorem, it is easy to develop the following theorem. Theorem3: The mapping f : GN  ZN * satisfying f ((1,0))  ( 1 mod N ), f ((x, y))  x - ay (mod N), where (x, y)  GN and a2  D (mod N), is a group isomorphism . Its inverse mapping f -1 (1)  (1,0) (mod N), f -1 (u)  ((u + u-1 )/2, (u-1 - u)/2a (mod N), where u  ZN * . Theorem 4: If ( iX , y i ) = i  (x, y), over GN , we have ix - a iy ≡ (x - ay)i ( mod N). Theorem 5: If k ≡ 1 mod (l .c .m (p-1, q-1)), we have (x, y) = k  (x, y), for all (x, y)  GN.
  • 3. An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol www.ijres.org 19 | Page Legendre symbol Let a be an integer and p > 2 a prime, Define the Legendre Symbol (a/p)=0,1,-1 as follows a p = 0 if p divides a 1 if a is QR mod p −1 if a NQR mod p Jacobi Symbol If p is a positive odd integer with prime factorization P = 1 r i  pi ai . The Jacobi symbol ( n / p) is defined for all integers n by the equation ( n / p) = 1 r i  (n / pi)ai where (n / pi) is the legendre symbol. 1.3 Key Management In this step, the Bob chooses the Secrete Key Generation[5], and computes and publishes some auxiliary information on the bulletin. The Bob will perform the following steps: 1.3.1 Key Generation: Assume that the Bob to send messages E (cipher text) and Alice case receive the messages E and M. 1. The Bob chooses two primes p and q (p  q) 2. The Bob compute p  = p mod 4 and q  =q mod 4 where p  , q   {1,-1} 3. The Bob find non square integer D > 0 such that Legender symbols (D/p) = - p  and (D/p) = - q  4. The Bob compute n = p * q and m= (p+ p  ) (q+ q  ) / 4 5. The Bob select a integer value for S such that the jacobi symbol ( ( S2 - D)/n) = -1. As there are closely to ( ) / 2n  such values of S. 6. The Bob select a integer value for e such that ( e, m ) =1. and makes {n, e, S, D} as public. 7. The Bob compute d * e  (m+1)/2 mod m for d and keeps as private key 8. D is Key for the Cipher Text. 1.4 Encryption: The Bob changes the messages M to E. 1. The Bob get the M be a message to communicate / encrypt 2. The Bob compute j1 = (M2 -D)/n 3. The Bob compare If j1 = 1 go to step (4) else go to step (6) 4. The Bob compute x  (M2 +D) / ( M2 -D) (mod n ) And y  2M / (M2 -D) (mod n) 5. Go to step (8) 6. The Bob compare If j1 = -1 go to step (7) else go to stop(). 7. The Bob compute x  ((M2 +D)(S2 + D) + 4DMS) / (( M2 -D) (S2 - D) ) (mod n ) And y  (2S (M2 +D) + 2M (S2 + D)) / (( M2 -D) (S2 - D) ) (mod n ) 8. The Bob compute j2 = x (mod 2) where j2 {0, 1} (nothing that x2 - Dy2 =1(mod n) for these values of x, y and assume that (y, n) =1) 9. The Bob Put Xl = x and Yl = y 10. The Bob compute (Xl+1, Xl) (mod n ) such that if i  j
  • 4. An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol www.ijres.org 20 | Page Xi+j = Xj + D Yi Yj and Yi+j = Xi Yj + Xj Yi if i = j X2i = Xi 2 +D Yi 2 or 2 Xi 2 – 1 and Y2i = 2 Xi Yi 11. The Bob compute E = DYXl (Xl+1 – x Xl)-1 mod n (here E is the cipher text) with 0<E<n 12. Send the {E, j1, j2 ) = cipher text. 1.5 Decryption After receiving the ciphertext (E, j1,j2), the Alice checks that x2 −D y2 ≡ 1 If yes, Alice can continue 1. The Alice compute X2l = (E2 + D) / (E2 - D) (mod n) and i. Y2l = (2E / (E2 - D)) (mod n ) 2. The Alice compute Xd (X2e)  X2de (x)(mod n) and i. Xd+1 (X2e)  X2de+2e (x)(mod n) ii. We have X2ed =  x (mod n) and j2  x (mod 2) 3. The Alice compute  and therefore determines x (mod n) And find y   Y 2de   (X2de+2e - X2e Xd ) / DX2e mod n we have t  x + y D mod n Compute t1 such that t1 = t if j1 = 1 else if j1 = -1 t1 = t (S- D ) / (S + D ) And t1 = (M + D ) / (M - D ) mod n 4. The Alice compute M  (t1 +1) ( D ) / ( t1 -1) (mod n) The Bob sends message (M) to key generation function that produces a secure private key (D). This private key is then encrypted with public key cryptosystem using the Bob’s private key to form the result. Both the message and the result are prepended and then transmitted. The Alice takes the message (M) and produces a secure private key (D). The Alice also decrypts the result using the Bob’s public key. If the calculated secure private key (D) matches the decrypted results, the result is accepted as valid. Because only the Bob knows the private key and only the Bob could have produced a valid result. III. CONCLUSION In this paper, we have proposed an Identity based encryption scheme using Pell’s equation with Legendre and Jacobi symbols. This scheme is a multi-use scheme, which means every Alice only needs to keep one private secrete. The Alice just use the public information and their own private information to get the information back. When then identity is changed, the Bob only needs to adjust the private key. And one of the benefits of this scheme is that the Bob will not ask for some extra information from all the Alice while in the information updating stage. We also show how to verify the information which comes from other Alice. Furthermore, because this scheme is constructed on the pells equation, we attain a much higher level of security comparing with the original public key problem in the same bits length. REFERENCES [1]. Chen C.Y., Chang C.C. Yang W.P.,"Fast RSA type cryptosystem based on Pell equation”, Proceeding of International Conf. On Cryptology and Information Security Taiwan, Dec.1-5, 1996 [2]. C Cocks Split “Generation of RSA Parameters with multiple participants” proceeding of 6th IMA conference on Cryptography and Coding, Spring LNCS 1355. [3]. A. Shamir, “Identity- Based Cryptosystems and Signature schemes advances in Cryptology” – Proceeding of Crypto’84. [4]. D. Boneh and M. Franklin, “Identity-based encryption from the Weil paring,” Advances in Cryptology- Crypto’2001, Lecture Notes on Computer Science 2139, Springer-Verlag (2001), pp.213-229. [5]. Michael J.JacobSon and Jr.Hugh C.Williams 2009 “Solving the Pell Equation”, pages 353-359.