Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security
نویسندگان
چکیده
The demand for data security schemes has increased with the significant advancement in field of computation and communication networks. We propose a novel three-step text encryption scheme that provable against attacks such as key attack statistical attack. proposed is based on Pell sequence elliptic curves, where at first step plain diffused to get meaningless by applying cyclic shift symbol set. In second step, we hide elements from attackers. For this purpose, use sequence, weight function, binary encode each element into real numbers. encoded then confused generating permutations over curves third step. show sensitivity attacks. Furthermore, secure spacing attack, ciphertext only known-plaintext Compared some existing schemes, highly modern cryptanalysis.
منابع مشابه
Limits of Provable Security for Homomorphic Encryption
We show that public-key bit encryption schemes which support weak (i.e., compact) homomorphic evaluation of any sufficiently “sensitive” collection of functions cannot be proved message indistinguishable beyond AM ∩ coAM via general (adaptive) reductions, and beyond statistical zero-knowledge via reductions of constant query complexity. Examples of sensitive collections include parities, majori...
متن کاملProvable-Security of Public-Key Encryption Schemes
Intuition. Suppose that your lecturer writes the number 25927 on the board and asks everyone in the class for its prime factorisation. Immediately Alice, who is incidentally a friend of the lecturer, shouts 11 × 2357. What conclusion can be drawn from this? Can we conclude that Alice is very good at factoring integers? It might haven been the case that Alice’s favourite primes are 11 and 2357 a...
متن کاملImproved convertible authenticated encryption scheme with provable security
Article history: Received 26 August 2010 Received in revised form 22 November 2010 Accepted 25 March 2011 Available online 14 April 2011 Communicated by L. Viganò
متن کاملPrivacy-preserving multireceiver ID-based encryption with provable security
Multireceiver identity (ID) based encryption and ID-based broadcast encryption allow a sender to use the public identities of multiple receivers to encrypt messages so that only the selected receivers or a privileged set of users can decrypt the messages. It can be used for many practical applications such as digital content distribution, pay-per-view and multicast communication. For protecting...
متن کاملProvable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the block cipher KASUMI and the provable security of f8. First we show that the three round KASUMI is not a pseudorandom permutation ensemble but the four round KASUMI is a pseudorandom permutation ensemble under the ada...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers, materials & continua
سال: 2022
ISSN: ['1546-2218', '1546-2226']
DOI: https://doi.org/10.32604/cmc.2022.023685