DOI QR코드

DOI QR Code

CRYPTOGRAPHIC ALGORITHM INVOLVING THE MATRIX Qp*

  • Kannan, J. (Department of Mathematics, Ayya Nadar Janaki Ammal College (Madurai Kamaraj University)) ;
  • Mahalakshmi, M. (Department of Mathematics, Ayya Nadar Janaki Ammal College (Madurai Kamaraj University)) ;
  • Deepshika, A. (Department of Mathematics, Ayya Nadar Janaki Ammal College (Madurai Kamaraj University))
  • Received : 2022.05.13
  • Accepted : 2022.09.07
  • Published : 2022.09.30

Abstract

Cryptography is one of the most essential developing areas, which deals with the secure transfer of messages. In recent days, there are more number of algorithms have been evolved to provide better security. This work is also such an attempt. In this paper, an algorithm is presented for encryption and decryption which employs the matrix Qp* and the well- known equation x2 - py2 = 1 where p is a prime.

Keywords

References

  1. Andreescu, T., Andrica, D., and Cucurezeanu, I, An Introduction to Diophantine Equations a Problem- Based Approach, Birkhauser Boston, 2010.
  2. Gould, H. W, A history of the Fibonacci Q-matrix and a higher-dimensional problem, Fibonacci Quart, 19(3) (1981), 250-257.
  3. J. Kannan, Manju Somanath, M. Mahalakshmi and K. Raja, Remodeled RSA Algorithm for Messages of Length Two Employing G- Primes, International Journal of Mathematics and Computer Research, 10(2)(2022), 2555-2558.
  4. J. Kannan, Manju Somanath, M. Mahalakshmi and K. Raja, Encryption Decryption Algorithm Using Solutions of Pell Equation, International Journal of Mathematics and its Applications, 10(1) (2022), 1-8.
  5. M. Mahalakshmi, J. Kannan, Manju Somanath, K. Raja, and K. Kaleeswari,Cryptographic Algorithm Based on Prime Assignment, International Journal for Research in Applied Science & Engineering Technology, 10(1) (2022),1744-1751, DOI: 10.22214/ijraset.2022.40138.
  6. Manju Somanath, K. Raja, J. Kannan and M. Mahalakshmi,On a Class of Solutions for a Quadratic Diophantine Equation, Advances and Applications in Mathematical Sciences, 19(11) (2020),1097-1103.
  7. Sumeyra, U. C. A. R., Nihal, T. A. S., & Ozgur, N. Y,A new application to coding theory via Fibonacci and Lucas numbers, Mathematical Sciences and Applications E-Notes, 7(1) (2019), 62-70. https://doi.org/10.36753/mathenot.559251
  8. Tas, N., Ucar, S., Ozgur, N. Y., & Kaymak, O. O, A new coding/decoding algorithm using Fibonacci numbers, Discrete Mathematics, Algorithms and Applications, 10(02) (2018), 1850028. https://doi.org/10.1142/S1793830918500283
  9. Tekcan, A, Continued fractions expansion of $\sqrt{D}$ and Pell equation x2 - Dy2 = 1. Mathematica Moravica, 15(2)(2011), 19-27. https://doi.org/10.5937/MatMor1102019T
  10. Trappe, W., & Washington, L. C, Introduction to Cryptography. Prentice Hall, 2006.