利用卡尔达诺算法求解密码系统中的三次方程,保护数据安全免受网络攻击

Basim najim al-din abed, Bayda Z. Kamil, M. A. Hameed, Jenan N. Abdullah
{"title":"利用卡尔达诺算法求解密码系统中的三次方程,保护数据安全免受网络攻击","authors":"Basim najim al-din abed, Bayda Z. Kamil, M. A. Hameed, Jenan N. Abdullah","doi":"10.1109/AiCIS51645.2020.00030","DOIUrl":null,"url":null,"abstract":"With the development taking place these days in information technology and protecting data security of data transmitted over the internet, there is an urgent and necessary need in order to protect data from falling into the hands of unauthorized persons. The difficulty of breaking the cipher text representing by using multiple keys instead of one key in the process of encryption and decryption, so it found that the mathematics represent a basic in many sciences because of the wide using for the concepts of the equations and functions, so one of the important using of the mathematics is in the cryptography science because all the cryptosystems in the world dells with the arithmetic operations, in this paper a new cryptosystem presented through using the 3ed order equation (cubic equation) for one variables and using Cardano's method for solving cubic equation, in order to add more security and complexity to the proposed cryptosystem since there is four different symmetric keys and changeable formula of the equation, many cryptanalysis applied on the proposed cryptosystem to ensure the validity and secrecy of the proposed algorithm, all results show the strength of the cryptosystem against the attacks as shown in the result section.","PeriodicalId":388584,"journal":{"name":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Using Cardano's method for solving cubic equation in the cryptosystem to protect data security against Cyber attack\",\"authors\":\"Basim najim al-din abed, Bayda Z. Kamil, M. A. Hameed, Jenan N. Abdullah\",\"doi\":\"10.1109/AiCIS51645.2020.00030\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the development taking place these days in information technology and protecting data security of data transmitted over the internet, there is an urgent and necessary need in order to protect data from falling into the hands of unauthorized persons. The difficulty of breaking the cipher text representing by using multiple keys instead of one key in the process of encryption and decryption, so it found that the mathematics represent a basic in many sciences because of the wide using for the concepts of the equations and functions, so one of the important using of the mathematics is in the cryptography science because all the cryptosystems in the world dells with the arithmetic operations, in this paper a new cryptosystem presented through using the 3ed order equation (cubic equation) for one variables and using Cardano's method for solving cubic equation, in order to add more security and complexity to the proposed cryptosystem since there is four different symmetric keys and changeable formula of the equation, many cryptanalysis applied on the proposed cryptosystem to ensure the validity and secrecy of the proposed algorithm, all results show the strength of the cryptosystem against the attacks as shown in the result section.\",\"PeriodicalId\":388584,\"journal\":{\"name\":\"2020 2nd Annual International Conference on Information and Sciences (AiCIS)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 2nd Annual International Conference on Information and Sciences (AiCIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/AiCIS51645.2020.00030\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 2nd Annual International Conference on Information and Sciences (AiCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AiCIS51645.2020.00030","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

随着资讯科技的发展和保护互联网上数据传输的数据安全,我们迫切需要防止数据落入未经授权的人手中。在加密和解密过程中,使用多个密钥而不是一个密钥表示密码文本的破解困难,因此发现数学是许多科学的基础,因为方程和函数的概念被广泛使用,所以数学的重要应用之一是在密码学中,因为世界上所有的密码系统都与算术运算有关。本文采用单变量的3ed阶方程(三次方程)和卡尔达诺求解三次方程的方法提出了一种新的密码系统,为了增加所提出密码系统的安全性和复杂性,由于该密码系统有四个不同的对称密钥和方程的可变公式,因此在所提出的密码系统上应用了许多密码分析,以确保所提出算法的有效性和保密性。所有结果都显示了密码系统抵御攻击的强度,如结果部分所示。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Using Cardano's method for solving cubic equation in the cryptosystem to protect data security against Cyber attack
With the development taking place these days in information technology and protecting data security of data transmitted over the internet, there is an urgent and necessary need in order to protect data from falling into the hands of unauthorized persons. The difficulty of breaking the cipher text representing by using multiple keys instead of one key in the process of encryption and decryption, so it found that the mathematics represent a basic in many sciences because of the wide using for the concepts of the equations and functions, so one of the important using of the mathematics is in the cryptography science because all the cryptosystems in the world dells with the arithmetic operations, in this paper a new cryptosystem presented through using the 3ed order equation (cubic equation) for one variables and using Cardano's method for solving cubic equation, in order to add more security and complexity to the proposed cryptosystem since there is four different symmetric keys and changeable formula of the equation, many cryptanalysis applied on the proposed cryptosystem to ensure the validity and secrecy of the proposed algorithm, all results show the strength of the cryptosystem against the attacks as shown in the result section.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信