SlideShare a Scribd company logo
1 of 7
Download to read offline
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 144
e-ISSN: 2349-9745
p-ISSN: 2393-8161
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
Akshaykumar Meshram1
, Dr. N.W.Khobragade2
Ph.D Scholar1
, Professor2
1, 2
Department of Mathematics, R.T.M. Nagpur University, Nagpur (M.S.), India
Abstract— In this paper we study of the MOR cryptosystem using camina group. We show
that using the automorphism of the camina group one can build a secure MOR cryptosystem.
Keywords- MOR cryptosystem, Camina group, Discrete Logarithm Problem, Diffie- Hellman
problem, ElGamal cryptosystem.
I. INTRODUCTION
The digital system has brought revolutionary changes in every walk of life. The data storage,
its processing and the outcome are the major stages in it. Naturally security of the same is a
quite concern in this matter.
Cryptography, which basically writing codes and solving codes, has worked out justifiable
solution to the problem of security of the digital data.
A Principal Goal of (Public Key) Cryptography is to allow two people to exchange confidential
information, even if they have never met and can communicate only viaa channel that is being
monitored by an adversary.
There are three cryptosystems widely in use today:
1) RSA(Ron Rivest, Adi Shamir and Leonard Adleman).
2) The El-Gamal or the Diffie-Hellman key exchange protocol over the multiplication group
of a finite field.
3) The El-Gamal or the Diffie -Hellman key exchange protocol over the group of points on an
Elliptic curve over a finite field.
The security type of the 1st
and 2nd
is the same. The best known attack against them, the index
calculus method, is sub-exponential in nature. On the other hand, the best known attack against
3rd
is exponential in nature. Today, some cryptographers try to build public key cryptosystems
based on non-abelian groups with the security expected at least as secure as Elliptic curve
cryptosystems.
Discrete Logarithm Problem (DLP) is the famous problem in cryptography. It is the complexity
of DLP, which is the base of most commonly, used cryptosystem like the ElGamal
cryptosystems over finite field or Elliptic curve cryptosystems. The algebraic groups used in
such cryptosystems are abelian (commutative). There are many ones based on DLP other than
ElGamal and Elliptic cryptosystems. Among them, we studied the MOR cryptosystem over the
automorphism group Aut(G) of a non-abelian group G.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 145
II. PRELIMINARIES
Most of the definition used in these papers is standard.
2.1 Discrete Logarithm Problem {DLP}:
The (discrete) exponentiation problem is as follows: Given a base a, an exponent b and a
modulus p, calculate c such that ab
≡ c (mod p) and 0 ≤ c < p.
It turns out that this problem is fairly easy and can be calculated "quickly" using fast-
exponentiation.
The discrete log problem is the inverse problem:
Given a base a, a result c (0 ≤ c < p) and a modulus p, calculate the exponent b such that
ab
≡ c (mod p).
It turns out that no one has found a quick way to solve this problem. To get an intuition as to
why this is the case, try picking different values of a and p, and listing out each successive
power of a mod p. What you will find is that there is no discernable pattern for the list of
numbers created. Thus, given a number on the list, it's very difficult to predict where it appears
on the list.
2.2 ElGamal Cryptosystem:
Let q be a prime such that the discrete logarithm problem in (Zq,) is infeasible and let Zq be
a primitive element. Let P=Zq, C=Zq×Zq, and define
K={(q, , XB, YB): YB= BX
mod q}.
The values q,  and YB are the public key and XB is the private key.
For K= (q,, XB, YB), and for a (secret) random number kZq-1, define
ek(x, k)=(C1, C2)
Where
C1=k
mod q
C2= x k
BY mod q
For C1 and C2Zq , define
k
(C1, C2)=C2
1
1( )BX
C 
mod q
2.2 Camina Group:
A group G is called a Camina group if
	
≠ 	 , and for each 	 ∈ 	 		 ′
the following
equation holds:
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 146
= { },
where =	{
	
		 ∈ } is the conjugacy class of x in G and x{G’} denotes the
set { / ′
∈ ′
}.
It is well know that,
1) In Camina group the equality
= { ′
} 	
2) In an arbitrary group ⊆ { ′} for each	 	 	 .
III. THE MOR CRYPTOSYSTEM
In this section we discuss the MOR cryptosystem. The concept of the MOR cryptosystem was
first proposed in Crypto2001 by Paeng et al[2].There are two different security concepts used
in [2].
a) The discrete logarithm problem in the group of inner automorphisms.
b) Membership problem in a finite cyclic group.
The MOR cryptosystem is a generalization of ElGamal cryptosystem, where the discrete
logarithm problem works in the automorphism group of a group G, instead of the group G
itself.
Later in same year, Paeng et al [3], they generalized the MOR cryptosystem and study this
new system for non abelian group.
In 2003, Seong-Hun Paeng [4] shows that there are subexponential time algorithms to solve
the DLP in inner automorphism groups for some non-abelian groups.
3.1 Description of the MOR cryptosystem:
Alice’s keys are as follows:
Public Key: ∅ and	∅ , ∈ ℕ.
Private Key: m.
Encryption
a) To send a message ∈ Bob computes ∅ and ∅ for a random		 	 ∈ ℕ.
b) The ciphertext is (∅ , ∅ (a)).
Decryption
Alice knows m, so if she receives the ciphertext (∅ , ∅ (a)), she computes ∅ from ∅ 	and
then ∅ and then from ∅ (a) computes ‘a’.
Alice can compute ∅ in two ways,
a) If she has the information necessary to find out the order of the automorphism ∅ then she
can use the identity 	∅ = ∅ whenever 	∅ = 1.
b) She can find out the order of some subgroup in which ∅ belongs and use the same identity.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 147
IV. The MOR cryptosystem using Camina group
Camina groups were introduced by A.R.Camina in [5]. The standard definition of camina group
mention above and this group had been extensively studied R. Dark, C.M. Scoppola in [6].
Aayn Mahalanobis elaborately explained that the currently group for the MOR cryptosystem
[2] is	 2, × .The automorphisms proposed is inner autotomorphism. It is shown in [4]
that the DLP in the group of inner autotomorphism of 2, × in the same as the DLP
in 2, . So here we consider map ∅: → be an automorphism of camina group and the
map ∅:
∅( )
→
∅( )
.
Theorem: A finite non abelian group G is a Camina group if and only if G is a Camina p-group
of nilpotance class.
In 2010, Marcel Herzog [7], shows that if G is non abelian polycyclic by finite camina group,
then 	is finite and if G is non abelian locally finite camina group, then the of the following
hold
a) is a p-group, for suitable prime p.
b) is a nilpotent group, and either is p-group or is a localy cyclic group.
Also if G is non-abelian camina group, then if
( )
is finite then G is finite and if
( )
is a
locally finite p-group, then G is a locally finite p-group.
In 2007 Aayn Mahalanobis[8], show that MOR cryptosystem over finite p-group is only as
secure as the ELGamal have cryptosystem over finite field.
On using automorphism of camina group, we can make secure MOR cryptosystem as this
group can reduce into p-group and using fact that,
If G is a camina group,
∈ ′ and 	 ∈ ′
then = for some ∈ .
′
= ( ) ′
= ( ) ′
= ( [ , ]) ′
= ′
and from | | = 	 ℎ 	 ≡ 1( )
Since,
, ∈ ′ implies < >=< > for some ∈ and = ( ) for some integer n.
Using above fact one can build secure MOR cryptosystem using camina group as it can be
reduce to p-group and it is depending upon the value of		 ∈ ′
which is very difficult to break
such cryptosystem.
V. Conclusion
The objective of this paper is to study camina group for the MOR cryptosystem. It is prove that
by using camina group one can build secure MOR cryptosystem. The security of any proposed
cryptosystem matter of challenge and more work need to be done for security of the given
system.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 148
Acknowledgements
The authors would like to thank anonymous reviewers of International Journal of Modern
Trends in Engineering and Research for their careful and helpful comments.
Reference
[1] Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, An introduction to mathematical
cryptography, Springer, 2008.
[2] S.-H. Paeng, K.-C. Ha, J. Kim, S. Chee, C. Park, New public key cryptosystem using finite non
abelian groups, in: Advances in Cryptology-Crypto, 2001, pp. 470–485.
[3] S.-H. Paeng, D. Kwon, K.-C. Ha, J. Kim, Improved public key cryptosystem using finite non
abelian groups, IACR ePrint 2001/066.
[4] Seong-Hun Paeng ,On the security of cryptosystem using automorphism groups, Information
Processing Letters 88 (2003) 293–298
[5] A.R. Camina, Some conditions which almost characterize Frobenius groups, Israel J. Math 31
(1978), 153–160.
[6] R. Dark, C.M. Scoppola, On Camina groups of prime power order, J. Algebra 181 (1996), 787–
802.
[7] Marcel Herzog, on infinite Camina groups, Tel-aviv university 2010
[8] Aayn Mahalanobis, A note on using finite non-abelian p-groups in the MOR cryptosystem ,
arXiv:cs/0702095v1[cs:CR] 16 Feb 2007.
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM

More Related Content

What's hot

Modification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorialModification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorialAlexander Decker
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSAPratik Poddar
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...decentralizeeverything
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationMohammed Ashour
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSASrilal Buddika
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY IJNSA Journal
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clusteringaiiniR
 
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...Mriganka Mandal
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...ijsptm
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 

What's hot (19)

LSTM Tutorial
LSTM TutorialLSTM Tutorial
LSTM Tutorial
 
Modification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorialModification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorial
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clustering
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 

Viewers also liked

Close More Prospects With Edification That Works
Close More Prospects With Edification That WorksClose More Prospects With Edification That Works
Close More Prospects With Edification That WorksKofi Ford
 
Mans flicker or god's flame
Mans flicker or god's flameMans flicker or god's flame
Mans flicker or god's flamejb1955
 
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009Julia Volpe
 
How to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product designHow to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product designLindsay Bayuk
 
effective contract
effective contracteffective contract
effective contractnkt96
 
The brook dried up
The brook dried upThe brook dried up
The brook dried upjb1955
 
The Park DuValle Community Health Centers
The Park DuValle Community Health CentersThe Park DuValle Community Health Centers
The Park DuValle Community Health Centersmhmaggie
 
The beast the dragon and the woman
The beast the dragon and the womanThe beast the dragon and the woman
The beast the dragon and the womanjb1955
 
Family history project pt.1
Family history project pt.1Family history project pt.1
Family history project pt.1Amanda Pohlman
 
B2 book 22 - bruna rodrigues
B2   book 22 - bruna rodriguesB2   book 22 - bruna rodrigues
B2 book 22 - bruna rodriguesGerson Moura
 
Benefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement SystemsBenefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement SystemsBruce Robinson
 

Viewers also liked (13)

Close More Prospects With Edification That Works
Close More Prospects With Edification That WorksClose More Prospects With Edification That Works
Close More Prospects With Edification That Works
 
Mans flicker or god's flame
Mans flicker or god's flameMans flicker or god's flame
Mans flicker or god's flame
 
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
 
How to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product designHow to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product design
 
effective contract
effective contracteffective contract
effective contract
 
Achievement
AchievementAchievement
Achievement
 
The brook dried up
The brook dried upThe brook dried up
The brook dried up
 
The Park DuValle Community Health Centers
The Park DuValle Community Health CentersThe Park DuValle Community Health Centers
The Park DuValle Community Health Centers
 
The beast the dragon and the woman
The beast the dragon and the womanThe beast the dragon and the woman
The beast the dragon and the woman
 
Family history project pt.1
Family history project pt.1Family history project pt.1
Family history project pt.1
 
Dimana hatimu
Dimana hatimuDimana hatimu
Dimana hatimu
 
B2 book 22 - bruna rodrigues
B2   book 22 - bruna rodriguesB2   book 22 - bruna rodrigues
B2 book 22 - bruna rodrigues
 
Benefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement SystemsBenefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement Systems
 

Similar to CAMINA GROUP FOR THE MOR CRYPTOSYSTEM

Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPijccmsjournal
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...IDES Editor
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Swati Nagpal
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...Editor IJCATR
 
Least cost rumor blocking in social networks
Least cost rumor blocking in social networksLeast cost rumor blocking in social networks
Least cost rumor blocking in social networksPing Yabin
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)ArthyR3
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMijcisjournal
 
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPCNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPSam Bowne
 
Suzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuz Fanous
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGIJNSA Journal
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
 

Similar to CAMINA GROUP FOR THE MOR CRYPTOSYSTEM (20)

A1802040111
A1802040111A1802040111
A1802040111
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
 
I1803014852
I1803014852I1803014852
I1803014852
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
Least cost rumor blocking in social networks
Least cost rumor blocking in social networksLeast cost rumor blocking in social networks
Least cost rumor blocking in social networks
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPCNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
 
Suzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_Thesis
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
C0211822
C0211822C0211822
C0211822
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
11
1111
11
 
11
1111
11
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIPEditor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentEditor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationEditor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetEditor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESEditor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialEditor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTEditor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisEditor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsEditor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection TechniquesEditor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSEditor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkEditor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveEditor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONEditor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeEditor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisEditor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeEditor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

CAMINA GROUP FOR THE MOR CRYPTOSYSTEM

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 144 e-ISSN: 2349-9745 p-ISSN: 2393-8161 CAMINA GROUP FOR THE MOR CRYPTOSYSTEM Akshaykumar Meshram1 , Dr. N.W.Khobragade2 Ph.D Scholar1 , Professor2 1, 2 Department of Mathematics, R.T.M. Nagpur University, Nagpur (M.S.), India Abstract— In this paper we study of the MOR cryptosystem using camina group. We show that using the automorphism of the camina group one can build a secure MOR cryptosystem. Keywords- MOR cryptosystem, Camina group, Discrete Logarithm Problem, Diffie- Hellman problem, ElGamal cryptosystem. I. INTRODUCTION The digital system has brought revolutionary changes in every walk of life. The data storage, its processing and the outcome are the major stages in it. Naturally security of the same is a quite concern in this matter. Cryptography, which basically writing codes and solving codes, has worked out justifiable solution to the problem of security of the digital data. A Principal Goal of (Public Key) Cryptography is to allow two people to exchange confidential information, even if they have never met and can communicate only viaa channel that is being monitored by an adversary. There are three cryptosystems widely in use today: 1) RSA(Ron Rivest, Adi Shamir and Leonard Adleman). 2) The El-Gamal or the Diffie-Hellman key exchange protocol over the multiplication group of a finite field. 3) The El-Gamal or the Diffie -Hellman key exchange protocol over the group of points on an Elliptic curve over a finite field. The security type of the 1st and 2nd is the same. The best known attack against them, the index calculus method, is sub-exponential in nature. On the other hand, the best known attack against 3rd is exponential in nature. Today, some cryptographers try to build public key cryptosystems based on non-abelian groups with the security expected at least as secure as Elliptic curve cryptosystems. Discrete Logarithm Problem (DLP) is the famous problem in cryptography. It is the complexity of DLP, which is the base of most commonly, used cryptosystem like the ElGamal cryptosystems over finite field or Elliptic curve cryptosystems. The algebraic groups used in such cryptosystems are abelian (commutative). There are many ones based on DLP other than ElGamal and Elliptic cryptosystems. Among them, we studied the MOR cryptosystem over the automorphism group Aut(G) of a non-abelian group G.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 145 II. PRELIMINARIES Most of the definition used in these papers is standard. 2.1 Discrete Logarithm Problem {DLP}: The (discrete) exponentiation problem is as follows: Given a base a, an exponent b and a modulus p, calculate c such that ab ≡ c (mod p) and 0 ≤ c < p. It turns out that this problem is fairly easy and can be calculated "quickly" using fast- exponentiation. The discrete log problem is the inverse problem: Given a base a, a result c (0 ≤ c < p) and a modulus p, calculate the exponent b such that ab ≡ c (mod p). It turns out that no one has found a quick way to solve this problem. To get an intuition as to why this is the case, try picking different values of a and p, and listing out each successive power of a mod p. What you will find is that there is no discernable pattern for the list of numbers created. Thus, given a number on the list, it's very difficult to predict where it appears on the list. 2.2 ElGamal Cryptosystem: Let q be a prime such that the discrete logarithm problem in (Zq,) is infeasible and let Zq be a primitive element. Let P=Zq, C=Zq×Zq, and define K={(q, , XB, YB): YB= BX mod q}. The values q,  and YB are the public key and XB is the private key. For K= (q,, XB, YB), and for a (secret) random number kZq-1, define ek(x, k)=(C1, C2) Where C1=k mod q C2= x k BY mod q For C1 and C2Zq , define k (C1, C2)=C2 1 1( )BX C  mod q 2.2 Camina Group: A group G is called a Camina group if ≠ , and for each ∈ ′ the following equation holds:
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 146 = { }, where = { ∈ } is the conjugacy class of x in G and x{G’} denotes the set { / ′ ∈ ′ }. It is well know that, 1) In Camina group the equality = { ′ } 2) In an arbitrary group ⊆ { ′} for each . III. THE MOR CRYPTOSYSTEM In this section we discuss the MOR cryptosystem. The concept of the MOR cryptosystem was first proposed in Crypto2001 by Paeng et al[2].There are two different security concepts used in [2]. a) The discrete logarithm problem in the group of inner automorphisms. b) Membership problem in a finite cyclic group. The MOR cryptosystem is a generalization of ElGamal cryptosystem, where the discrete logarithm problem works in the automorphism group of a group G, instead of the group G itself. Later in same year, Paeng et al [3], they generalized the MOR cryptosystem and study this new system for non abelian group. In 2003, Seong-Hun Paeng [4] shows that there are subexponential time algorithms to solve the DLP in inner automorphism groups for some non-abelian groups. 3.1 Description of the MOR cryptosystem: Alice’s keys are as follows: Public Key: ∅ and ∅ , ∈ ℕ. Private Key: m. Encryption a) To send a message ∈ Bob computes ∅ and ∅ for a random ∈ ℕ. b) The ciphertext is (∅ , ∅ (a)). Decryption Alice knows m, so if she receives the ciphertext (∅ , ∅ (a)), she computes ∅ from ∅ and then ∅ and then from ∅ (a) computes ‘a’. Alice can compute ∅ in two ways, a) If she has the information necessary to find out the order of the automorphism ∅ then she can use the identity ∅ = ∅ whenever ∅ = 1. b) She can find out the order of some subgroup in which ∅ belongs and use the same identity.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 147 IV. The MOR cryptosystem using Camina group Camina groups were introduced by A.R.Camina in [5]. The standard definition of camina group mention above and this group had been extensively studied R. Dark, C.M. Scoppola in [6]. Aayn Mahalanobis elaborately explained that the currently group for the MOR cryptosystem [2] is 2, × .The automorphisms proposed is inner autotomorphism. It is shown in [4] that the DLP in the group of inner autotomorphism of 2, × in the same as the DLP in 2, . So here we consider map ∅: → be an automorphism of camina group and the map ∅: ∅( ) → ∅( ) . Theorem: A finite non abelian group G is a Camina group if and only if G is a Camina p-group of nilpotance class. In 2010, Marcel Herzog [7], shows that if G is non abelian polycyclic by finite camina group, then is finite and if G is non abelian locally finite camina group, then the of the following hold a) is a p-group, for suitable prime p. b) is a nilpotent group, and either is p-group or is a localy cyclic group. Also if G is non-abelian camina group, then if ( ) is finite then G is finite and if ( ) is a locally finite p-group, then G is a locally finite p-group. In 2007 Aayn Mahalanobis[8], show that MOR cryptosystem over finite p-group is only as secure as the ELGamal have cryptosystem over finite field. On using automorphism of camina group, we can make secure MOR cryptosystem as this group can reduce into p-group and using fact that, If G is a camina group, ∈ ′ and ∈ ′ then = for some ∈ . ′ = ( ) ′ = ( ) ′ = ( [ , ]) ′ = ′ and from | | = ℎ ≡ 1( ) Since, , ∈ ′ implies < >=< > for some ∈ and = ( ) for some integer n. Using above fact one can build secure MOR cryptosystem using camina group as it can be reduce to p-group and it is depending upon the value of ∈ ′ which is very difficult to break such cryptosystem. V. Conclusion The objective of this paper is to study camina group for the MOR cryptosystem. It is prove that by using camina group one can build secure MOR cryptosystem. The security of any proposed cryptosystem matter of challenge and more work need to be done for security of the given system.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 148 Acknowledgements The authors would like to thank anonymous reviewers of International Journal of Modern Trends in Engineering and Research for their careful and helpful comments. Reference [1] Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, An introduction to mathematical cryptography, Springer, 2008. [2] S.-H. Paeng, K.-C. Ha, J. Kim, S. Chee, C. Park, New public key cryptosystem using finite non abelian groups, in: Advances in Cryptology-Crypto, 2001, pp. 470–485. [3] S.-H. Paeng, D. Kwon, K.-C. Ha, J. Kim, Improved public key cryptosystem using finite non abelian groups, IACR ePrint 2001/066. [4] Seong-Hun Paeng ,On the security of cryptosystem using automorphism groups, Information Processing Letters 88 (2003) 293–298 [5] A.R. Camina, Some conditions which almost characterize Frobenius groups, Israel J. Math 31 (1978), 153–160. [6] R. Dark, C.M. Scoppola, On Camina groups of prime power order, J. Algebra 181 (1996), 787– 802. [7] Marcel Herzog, on infinite Camina groups, Tel-aviv university 2010 [8] Aayn Mahalanobis, A note on using finite non-abelian p-groups in the MOR cryptosystem , arXiv:cs/0702095v1[cs:CR] 16 Feb 2007.