Abstract
Discrete cryptographic such as RSA, knapsack, and discrete logarithms are the oldest and best cryptographic techniques. They are worked during finite field. In this paper, an attempt to another branch of cryptography was introduced. In this proposed method, the interpolation branch of mathematics is used for text cryptography. Proposed method was introduced to cipher the plaintext message as word by word. In encryption part, three steps are implemented for product cipher word. First, each letter of the word transformed to decimal number, then to binary. Second, the binary codeword transformed to decimal. Third, the finally cipher word is represented as triple. So it transformed to three numbers by descending the original number. A quadratic polynomial is constructed where the three numbers are represented in the coefficients of the polynomial. By choosing of three temp small independent values, three dependent values are calculated as the code word. For decryption part, the special polynomial technique is used for recover the quadratic polynomial. The rest steps are deduced conversely with the encryption part procedure
Reference24 articles.
1. B.S. Kaliski, R.L.Rivest, and A.T. Shermam, is the data encryption standard a group, result of cycling experiments on DES, cryptology, vol.1,1988, pp. 3-36.
2. T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, 469-472, 1985.
3. I. Biehl, B. Meyer, and V. M•uller. Differential fault attackson elliptic curve cryptosystems. In M. Bellare, editor, CRYPTO, volume 1880 of Lecture Notes in Computer Science, pp. 131-146. Springer, 2000.
4. M. Prabu and R. Shanmugalakshmi , A Comparative and Overview Analysis of Elliptic Curve Cryptography over FiniteFields, International Conference on Information and Multimedia Technology, ICIMT '09,2009, PP. 459-499.
5. X. Guangli; C. Zhuxiao; , The AlgebraHomomorphic Encryption Scheme Based on Fermat's Little Theorem, International Conference on Communication Systems and Network Technologies , vol.1, no.1, pp.978-981, 2012. [6]B.R. Ambedikar and S.S. Bedi, A New Factorization Method to Factorize RSA Public Key Encryption, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 1, November, 2011, pp. 242-247.