N. Sheikh, Tapan Kumar Hazra, Hasina Rahman, Kanyasree Mustafi, A. Chakraborty
{"title":"安全加解密的多变量双目标映射","authors":"N. Sheikh, Tapan Kumar Hazra, Hasina Rahman, Kanyasree Mustafi, A. Chakraborty","doi":"10.1109/IEMECON.2017.8079619","DOIUrl":null,"url":null,"abstract":"In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained. For each case, we have taken a simple example in order to demonstrate the variation of encrypted message using different bijective functions. This unique methodology of modifying RSA algorithm using mathematical function provides security enhancement because computing inverse of a multi-variable bijective function is quite hard. The difficulty in computing inverse function might add an extra security provision to many existing cryptographic algorithms.","PeriodicalId":231330,"journal":{"name":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Multi-variable bijective mapping for secure encryption and decryption\",\"authors\":\"N. Sheikh, Tapan Kumar Hazra, Hasina Rahman, Kanyasree Mustafi, A. Chakraborty\",\"doi\":\"10.1109/IEMECON.2017.8079619\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained. For each case, we have taken a simple example in order to demonstrate the variation of encrypted message using different bijective functions. This unique methodology of modifying RSA algorithm using mathematical function provides security enhancement because computing inverse of a multi-variable bijective function is quite hard. The difficulty in computing inverse function might add an extra security provision to many existing cryptographic algorithms.\",\"PeriodicalId\":231330,\"journal\":{\"name\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"volume\":\"19 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMECON.2017.8079619\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMECON.2017.8079619","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-variable bijective mapping for secure encryption and decryption
In this paper we have proposed an innovative way to modify RSA algorithm in order to improve the security level of this scheme. The two-variable bijective mapping is utilized in this scope. A mathematical background of bijective function is discussed in order to understand the proposed technique. First of all the original RSA algorithm is discussed then the proposed modification methodology is explained. For each case, we have taken a simple example in order to demonstrate the variation of encrypted message using different bijective functions. This unique methodology of modifying RSA algorithm using mathematical function provides security enhancement because computing inverse of a multi-variable bijective function is quite hard. The difficulty in computing inverse function might add an extra security provision to many existing cryptographic algorithms.