Browse > Article

A Cryptography Algorithm using Telescoping Series  

Choi, Eun Jung (서울여자대학교 교양교육부)
Sakong, Yung (천안북일고등학교)
Park, Wang Keun (폴수학학교)
Publication Information
Journal of Korea Society of Digital Industry and Information Management / v.9, no.4, 2013 , pp. 103-110 More about this Journal
Abstract
In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.
Keywords
Cryptography; Cryptography Algorithm; Telescoping Series; RSA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 http://www.math.oregonstate.edu/home/ programs/undergrad/CalculusQuestStudyGuides/ SandS/SeriesTests/telescoping.html
2 http://www.wolfram.com
3 James Manyika, Michael Chui, Brad Brown, Jacques Bughin, Richard Dobbs, Charles Roxburgh, Angela Hung Byers, "Big Data: The Next Frontier for Innovation, Competition, and Productivity," McKinsey Global Institute, 2011. 5.
4 Lohr, S. "The Age of Big Data," New York Times, http://www.nytimes.com/2012/02/12/ sunday-review/big-datas-impact-in-the-world. html?pagewanted=all, 2012
5 John Gantz, David Reinsel, "Extracting Value from Chaos," IDC IVIEW, 2011. 6.
6 http://en.wikipedia.org/wiki/2013_global_ surveill ance_disclosures
7 "개인정보 침해신고 상담 건수.연 : 2000-2012," 방송통신위원회(한국인터넷진흥원 개인정보침해신고센터), 2013. 10. 7
8 https://www.index.go.kr/egams/stts/jsp/potal/ stts/PO_STTS_IdxMain.jsp?idx_cd=1366&bbs= INDX_001
9 "개인정보보호법," 안전행정부(개인정보보호과) 02- 2100-2817, 법률 제11690호, 2013. 3. 23
10 강주성 외/ETRI부설국가보안기술연구소 역, "현대 암호학," 경문사, 2002
11 A. Diffie, M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory IT-26, no. 6., 1976, pp. 644-654.
12 R. L. Rivest, A. Shamir, L. Adleman, "A Method for Obtaining Digital. Signatures and Public-Key Cryptosystems," Communications of the ACM vol. 21., 1978, pp 8-10.
13 P. W. Shor, "Algorithms for quantum computation: discrete logarithms and factoring," Proceedings, 35th Annual Symposium on Fundamentals of Computer Science (FOCS), 1994, pp. 124-134.
14 http://en.wikipedia.org/wiki/RSA_(algorithm)
15 Tom M. Apostol, "Calculus," Volume 1, Blaisdell Publishing Company, 1962, pp 422-423.
16 Brian S. Thomson, Andrew M. Bruckner, "Elementary Real Analysis Second Edition," CreateSpace, 2008, pp 85.