A New Cyclic Cryptographic Algorithm

被引:0
|
作者
Yfantis, E. A. [1 ]
机构
[1] UNLV, Comp Sci, Las Vegas, NV 89154 USA
关键词
Elliptic curve cryptography; RSA; Diffie Hellman; El Gamal; key management;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A new cryptographic algorithm based on a circle of arbitrary integer radius is presented in this research paper. This cryptographic algorithm performs phase modulation and integer modulation, using prime numbers. The algorithm shares some similar properties with the elliptic curves algorithm, but unlike the elliptic curves that have several points at infinity this algorithm has only one zero point. Encryption-decryption using this algorithm is straight forward. This algorithm is based on operations defined on the circumference of a circle of arbitrary radius and arbitrary center, modulo an arbitrary prime number large enough so that the cryptanalyst cannot break the code within a reasonable time. The operations around the circle provide the phase angle modulation while the modulo arithmetic with respect to the chosen prime number provide the integer modulation. This algorithm has no similarities with the phase-modulation transmission system for quantum cryptography, published in Physics journals. Based on its structure the algorithm should have the same complexity as the elliptic curve algorithm. Also based on an FPGA prototype using 8-bit prime numbers for modulation, FPGA implementation should be relatively easy.
引用
收藏
页码:20 / 25
页数:6
相关论文
共 50 条
  • [31] A New Cyclic Scheduling Algorithm for Flexible Manufacturing Systems
    Ouajdi Korbaa
    Hervé Camus
    Jean-Claude Gentina
    International Journal of Flexible Manufacturing Systems, 2002, 14 (2): : 173 - 187
  • [32] Encrypt Hardware Device Based on Cryptographic Algorithm
    Cong, Chen
    INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 139 - 145
  • [33] An efficient montgomery exponentiation algorithm for cryptographic applications
    Wu, CL
    Lou, DC
    Chang, TJ
    INFORMATICA, 2005, 16 (03) : 449 - 468
  • [34] FAST DECRIPTION ALGORITHM FOR THE KNAPSACK CRYPTOGRAPHIC SYSTEM
    HENRY, PS
    BELL SYSTEM TECHNICAL JOURNAL, 1981, 60 (05): : 767 - 773
  • [35] Research on a class of digital picture cryptographic algorithm
    Zhou Zi-wei
    Proceedings of 2004 Chinese Control and Decision Conference, 2004, : 327 - +
  • [36] An Approach to Identifying Cryptographic Algorithm from Ciphertext
    Tan, Cheng
    Ji, Qingbing
    PROCEEDINGS OF 2016 8TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2016), 2016, : 19 - 23
  • [37] SCARS: Simplified Cryptographic Algorithm for RFID Systems
    Narayanaswamy, Jayagopal
    Sampangi, Raghav V.
    Sampalli, Srinivas
    2014 IEEE RFID TECHNOLOGY AND APPLICATIONS CONFERENCE (RFID-TA), 2014, : 32 - 37
  • [38] Cryptographic algorithm for protection of communication in drones control
    Ivanov I.
    Andreev K.
    Vetova S.
    Arnaudov R.
    International Journal of Reasoning-based Intelligent Systems, 2021, 13 (01) : 32 - 38
  • [39] An elliptical cryptographic algorithm for RF wireless devices
    Owor, Robert Steven
    Dajani, Khalil
    Okonkwo, Zephyrinus
    Hamilton, John
    PROCEEDINGS OF THE 2007 WINTER SIMULATION CONFERENCE, VOLS 1-5, 2007, : 1403 - +
  • [40] Improvement over Public Key Cryptographic Algorithm
    Garg, Deepak
    Verma, Seema
    2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 734 - 739