通过数字系统增强数据安全:一种图灵机方法

H. Tripathi, Bramah Hazela
{"title":"通过数字系统增强数据安全:一种图灵机方法","authors":"H. Tripathi, Bramah Hazela","doi":"10.1109/CICT.2016.131","DOIUrl":null,"url":null,"abstract":"Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize the codes where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can make available physical or substantial security to information - allowing updating only to authorized users. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission. In reference to data security, a Turing-Machine is a device based on hypothesis that manages numbers dexterously on stripe of tape according to conditions of the table. In contempt of its simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic that would be useful in illuminating the function of a CPU. In this research-work authors have proposed a notion that takes binary number for a given decimal number and simulate the binary number through Turing-Machine. As a result of which the next number can be generated in binary form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal number is one more than the previous decimal number. This approach would be helpful to generate next successor decimal number from a given decimal number. Further this approach of number generation through Turing machine would be helpful in cryptographic techniques where, generated number can be applied for data security enhancement at both sender as well as receiver end.","PeriodicalId":118509,"journal":{"name":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Data Security Enhancement Through Number System: A Turing-Machine Approach\",\"authors\":\"H. Tripathi, Bramah Hazela\",\"doi\":\"10.1109/CICT.2016.131\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize the codes where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can make available physical or substantial security to information - allowing updating only to authorized users. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission. In reference to data security, a Turing-Machine is a device based on hypothesis that manages numbers dexterously on stripe of tape according to conditions of the table. In contempt of its simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic that would be useful in illuminating the function of a CPU. In this research-work authors have proposed a notion that takes binary number for a given decimal number and simulate the binary number through Turing-Machine. As a result of which the next number can be generated in binary form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal number is one more than the previous decimal number. This approach would be helpful to generate next successor decimal number from a given decimal number. Further this approach of number generation through Turing machine would be helpful in cryptographic techniques where, generated number can be applied for data security enhancement at both sender as well as receiver end.\",\"PeriodicalId\":118509,\"journal\":{\"name\":\"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CICT.2016.131\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Second International Conference on Computational Intelligence & Communication Technology (CICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CICT.2016.131","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

如今,在数据传输中,一天的隐私是信息从一个点发送到另一个点的主要问题。数据加密是计算机科学开发方案和公式以实现数据和信息安全的最有效途径。在其操作过程中,它允许序列以密文的形式进行编码,这是极其难以读取或识别的代码,其中解密是将编码文本转换为原始消息和信息的过程。本文提出了一种基于数论的数据加解密算法。此外,使用奇数系统(特别是使用五八进制(SNS))进行数据加密可以为信息提供物理或实质性的安全性——只允许授权用户更新。该算法采用五八进制奇数系统对数据进行加密,提出了一种更好的数据加解密策略,在数据传输过程中对各种可能的攻击方式提供了更好的安全性。在数据安全方面,图灵机是一种基于假设的设备,它根据表的条件在纸带上灵巧地管理数字。图灵机虽然简单,但在模拟了有助于阐明CPU功能的逻辑之后,它可以适用于任何计算机算法。本文提出了用二进制数表示给定的十进制数,并通过图灵机模拟二进制数的概念。其结果是下一个数字可以以二进制形式生成。此外,如果我们再次计算得到的二进制数的十进制数,得到的十进制数比前一个十进制数大1。这种方法有助于从给定的十进制数生成下一个后继十进制数。此外,这种通过图灵机生成数字的方法将有助于加密技术,其中生成的数字可以应用于发送端和接收端的数据安全性增强。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Data Security Enhancement Through Number System: A Turing-Machine Approach
Now a day's privacy is the main issue to sending information from one point to another in data transmission. Encryption of data is the most effective way of computer science concerned with developing schemes and formula to achieve data & information security. In its course of action, it allows sequence to be encoded in the form of cipher text where it is extremely difficult to read or recognize the codes where decryption is the procedure to transforming encoded text into the original message and information. In this paper we present an algorithm for data encryption and decryption which is based on number theory. In addition, data encryption using strange number system (especially using pentaoctagesimal (SNS) can make available physical or substantial security to information - allowing updating only to authorized users. This algorithm is used pentaoctagesimal strange number system to encrypt data and we propose a better data encryption and decryption strategy, which will offer better security towards all possible ways of attacks while data transmission. In reference to data security, a Turing-Machine is a device based on hypothesis that manages numbers dexterously on stripe of tape according to conditions of the table. In contempt of its simplicity, Turing-Machine can be pertinent at any computer algorithm after simulating the logic that would be useful in illuminating the function of a CPU. In this research-work authors have proposed a notion that takes binary number for a given decimal number and simulate the binary number through Turing-Machine. As a result of which the next number can be generated in binary form. Further if again we calculate the decimal of the obtained binary digits, the resultant decimal number is one more than the previous decimal number. This approach would be helpful to generate next successor decimal number from a given decimal number. Further this approach of number generation through Turing machine would be helpful in cryptographic techniques where, generated number can be applied for data security enhancement at both sender as well as receiver end.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信