Data Encryption and Decryption Using ANZL Algorithm
نویسندگان
چکیده
What is the ANZL Algorithm? It is a genuine result of our work which is theoretically and practically proved. By using the ANZL Algorithm, we can test whether a given number belongs to Lucas’s series. It can also be used to find a sequence of Lucas’s numbers, starting from any number . If a given number completes the relation , we can say that it is a Lucas number and we mark it as . From the pair of numbers , we can find the preceding and the succeeding e . Based on these three elements of Lucas’s series, we can create the key for data encryption and decryption. I ALGORITHM ANZL In mathematics, the Fibonacci numbers are a sequence of numbers named after Leonardo of Pisa, known as Fibonacci. For centuries, mathematicians both amateurs and professionals have been intrigued by the sequence of Fibonacci numbers and the closely related irrational number called the golden mean. The sequence begins with: where, as you can see, each number beginning with 2 is the sum of the two immediately preceding numbers. As you progress along the list of quotients of consecutive Fibonacci numbers, such as: you get closer and closer to the golden mean, which is exactly: and approximately . Another series quite similar to the Fibonacci series that often occurs when working with the Fibonacci series. Edouard Lucas (1842-1891) (who gave the name "Fibonacci Numbers" to the series written about by Leonardo of Pisa) studied this second series of numbers: called the Lucas numbers in his honour. On this page we examine some of the interesting properties of the Lucas numbers themselves as well as looking at its close relationship with the Fibonacci numbers. Based on Fibonacci’s series: We will be able to get the elements of Lucas’s series using: Where ! " # $ and " % ! & ". If ", is even, we use , if " is odd, the we use '. For " and ! , we have: ( ' ' For " and ! , we have: ) ' ( For " and ! , we have:
منابع مشابه
FPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملA New Polybit Shuffling Encryption and Decryption Algorithm Based on N Dimensional Encryption-Decryption Matrix
This paper elaborates polybit shuffling encryption and decryption algorithm based on N Dimensional encryption-decryption matrix which is an attempt to improve over the Classical Playfair Cipher. The unique feature of this algorithm is that it retains the simplicity of Classical Playfair Cipher but increases the robustness against crypto-attack by many folds. Moreover this algorithm can be used ...
متن کاملAn Approach to Improve the Data Security using Encryption and Decryption Technique
Cryptography is an art and science. It is a playing major role in information and security division. The main aim of the cryptography is protecting the data from unauthorized users or hackers. “Cryptography is subject contains two parts one is encryption and another one decryption. Encryption is a process converting the plain text to cipher text using some keys. Decryption is a process of conve...
متن کاملDouble-reflecting Data Perturbation Method for Information Security
Information Security plays a vital role in data Communication through LAN, WAN, Internet etc. Cryptography is one of the best tools for Information Security. Cryptography is made up of two different tools that are Encryption and Decryption. Encryption is the method to hide the original data in Data Communication. While Data Communication, the data is masked using codes/shuffling. Here the purpo...
متن کامل