SlideShare a Scribd company logo
Scientific Journal Impact Factor (SJIF): 1.711
International Journal of Modern Trends in Engineering
and Research
www.ijmter.com
@IJMTER-2014, All rights Reserved 144
e-ISSN: 2349-9745
p-ISSN: 2393-8161
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
Akshaykumar Meshram1
, Dr. N.W.Khobragade2
Ph.D Scholar1
, Professor2
1, 2
Department of Mathematics, R.T.M. Nagpur University, Nagpur (M.S.), India
Abstract— In this paper we study of the MOR cryptosystem using camina group. We show
that using the automorphism of the camina group one can build a secure MOR cryptosystem.
Keywords- MOR cryptosystem, Camina group, Discrete Logarithm Problem, Diffie- Hellman
problem, ElGamal cryptosystem.
I. INTRODUCTION
The digital system has brought revolutionary changes in every walk of life. The data storage,
its processing and the outcome are the major stages in it. Naturally security of the same is a
quite concern in this matter.
Cryptography, which basically writing codes and solving codes, has worked out justifiable
solution to the problem of security of the digital data.
A Principal Goal of (Public Key) Cryptography is to allow two people to exchange confidential
information, even if they have never met and can communicate only viaa channel that is being
monitored by an adversary.
There are three cryptosystems widely in use today:
1) RSA(Ron Rivest, Adi Shamir and Leonard Adleman).
2) The El-Gamal or the Diffie-Hellman key exchange protocol over the multiplication group
of a finite field.
3) The El-Gamal or the Diffie -Hellman key exchange protocol over the group of points on an
Elliptic curve over a finite field.
The security type of the 1st
and 2nd
is the same. The best known attack against them, the index
calculus method, is sub-exponential in nature. On the other hand, the best known attack against
3rd
is exponential in nature. Today, some cryptographers try to build public key cryptosystems
based on non-abelian groups with the security expected at least as secure as Elliptic curve
cryptosystems.
Discrete Logarithm Problem (DLP) is the famous problem in cryptography. It is the complexity
of DLP, which is the base of most commonly, used cryptosystem like the ElGamal
cryptosystems over finite field or Elliptic curve cryptosystems. The algebraic groups used in
such cryptosystems are abelian (commutative). There are many ones based on DLP other than
ElGamal and Elliptic cryptosystems. Among them, we studied the MOR cryptosystem over the
automorphism group Aut(G) of a non-abelian group G.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 145
II. PRELIMINARIES
Most of the definition used in these papers is standard.
2.1 Discrete Logarithm Problem {DLP}:
The (discrete) exponentiation problem is as follows: Given a base a, an exponent b and a
modulus p, calculate c such that ab
≡ c (mod p) and 0 ≤ c < p.
It turns out that this problem is fairly easy and can be calculated "quickly" using fast-
exponentiation.
The discrete log problem is the inverse problem:
Given a base a, a result c (0 ≤ c < p) and a modulus p, calculate the exponent b such that
ab
≡ c (mod p).
It turns out that no one has found a quick way to solve this problem. To get an intuition as to
why this is the case, try picking different values of a and p, and listing out each successive
power of a mod p. What you will find is that there is no discernable pattern for the list of
numbers created. Thus, given a number on the list, it's very difficult to predict where it appears
on the list.
2.2 ElGamal Cryptosystem:
Let q be a prime such that the discrete logarithm problem in (Zq,) is infeasible and let Zq be
a primitive element. Let P=Zq, C=Zq×Zq, and define
K={(q, , XB, YB): YB= BX
mod q}.
The values q,  and YB are the public key and XB is the private key.
For K= (q,, XB, YB), and for a (secret) random number kZq-1, define
ek(x, k)=(C1, C2)
Where
C1=k
mod q
C2= x k
BY mod q
For C1 and C2Zq , define
k
(C1, C2)=C2
1
1( )BX
C 
mod q
2.2 Camina Group:
A group G is called a Camina group if
	
≠ 	 , and for each 	 ∈ 	 		 ′
the following
equation holds:
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 146
= { },
where =	{
	
		 ∈ } is the conjugacy class of x in G and x{G’} denotes the
set { / ′
∈ ′
}.
It is well know that,
1) In Camina group the equality
= { ′
} 	
2) In an arbitrary group ⊆ { ′} for each	 	 	 .
III. THE MOR CRYPTOSYSTEM
In this section we discuss the MOR cryptosystem. The concept of the MOR cryptosystem was
first proposed in Crypto2001 by Paeng et al[2].There are two different security concepts used
in [2].
a) The discrete logarithm problem in the group of inner automorphisms.
b) Membership problem in a finite cyclic group.
The MOR cryptosystem is a generalization of ElGamal cryptosystem, where the discrete
logarithm problem works in the automorphism group of a group G, instead of the group G
itself.
Later in same year, Paeng et al [3], they generalized the MOR cryptosystem and study this
new system for non abelian group.
In 2003, Seong-Hun Paeng [4] shows that there are subexponential time algorithms to solve
the DLP in inner automorphism groups for some non-abelian groups.
3.1 Description of the MOR cryptosystem:
Alice’s keys are as follows:
Public Key: ∅ and	∅ , ∈ ℕ.
Private Key: m.
Encryption
a) To send a message ∈ Bob computes ∅ and ∅ for a random		 	 ∈ ℕ.
b) The ciphertext is (∅ , ∅ (a)).
Decryption
Alice knows m, so if she receives the ciphertext (∅ , ∅ (a)), she computes ∅ from ∅ 	and
then ∅ and then from ∅ (a) computes ‘a’.
Alice can compute ∅ in two ways,
a) If she has the information necessary to find out the order of the automorphism ∅ then she
can use the identity 	∅ = ∅ whenever 	∅ = 1.
b) She can find out the order of some subgroup in which ∅ belongs and use the same identity.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 147
IV. The MOR cryptosystem using Camina group
Camina groups were introduced by A.R.Camina in [5]. The standard definition of camina group
mention above and this group had been extensively studied R. Dark, C.M. Scoppola in [6].
Aayn Mahalanobis elaborately explained that the currently group for the MOR cryptosystem
[2] is	 2, × .The automorphisms proposed is inner autotomorphism. It is shown in [4]
that the DLP in the group of inner autotomorphism of 2, × in the same as the DLP
in 2, . So here we consider map ∅: → be an automorphism of camina group and the
map ∅:
∅( )
→
∅( )
.
Theorem: A finite non abelian group G is a Camina group if and only if G is a Camina p-group
of nilpotance class.
In 2010, Marcel Herzog [7], shows that if G is non abelian polycyclic by finite camina group,
then 	is finite and if G is non abelian locally finite camina group, then the of the following
hold
a) is a p-group, for suitable prime p.
b) is a nilpotent group, and either is p-group or is a localy cyclic group.
Also if G is non-abelian camina group, then if
( )
is finite then G is finite and if
( )
is a
locally finite p-group, then G is a locally finite p-group.
In 2007 Aayn Mahalanobis[8], show that MOR cryptosystem over finite p-group is only as
secure as the ELGamal have cryptosystem over finite field.
On using automorphism of camina group, we can make secure MOR cryptosystem as this
group can reduce into p-group and using fact that,
If G is a camina group,
∈ ′ and 	 ∈ ′
then = for some ∈ .
′
= ( ) ′
= ( ) ′
= ( [ , ]) ′
= ′
and from | | = 	 ℎ 	 ≡ 1( )
Since,
, ∈ ′ implies < >=< > for some ∈ and = ( ) for some integer n.
Using above fact one can build secure MOR cryptosystem using camina group as it can be
reduce to p-group and it is depending upon the value of		 ∈ ′
which is very difficult to break
such cryptosystem.
V. Conclusion
The objective of this paper is to study camina group for the MOR cryptosystem. It is prove that
by using camina group one can build secure MOR cryptosystem. The security of any proposed
cryptosystem matter of challenge and more work need to be done for security of the given
system.
International Journal of Modern Trends in Engineering and Research (IJMTER)
Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161
@IJMTER-2014, All rights Reserved 148
Acknowledgements
The authors would like to thank anonymous reviewers of International Journal of Modern
Trends in Engineering and Research for their careful and helpful comments.
Reference
[1] Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, An introduction to mathematical
cryptography, Springer, 2008.
[2] S.-H. Paeng, K.-C. Ha, J. Kim, S. Chee, C. Park, New public key cryptosystem using finite non
abelian groups, in: Advances in Cryptology-Crypto, 2001, pp. 470–485.
[3] S.-H. Paeng, D. Kwon, K.-C. Ha, J. Kim, Improved public key cryptosystem using finite non
abelian groups, IACR ePrint 2001/066.
[4] Seong-Hun Paeng ,On the security of cryptosystem using automorphism groups, Information
Processing Letters 88 (2003) 293–298
[5] A.R. Camina, Some conditions which almost characterize Frobenius groups, Israel J. Math 31
(1978), 153–160.
[6] R. Dark, C.M. Scoppola, On Camina groups of prime power order, J. Algebra 181 (1996), 787–
802.
[7] Marcel Herzog, on infinite Camina groups, Tel-aviv university 2010
[8] Aayn Mahalanobis, A note on using finite non-abelian p-groups in the MOR cryptosystem ,
arXiv:cs/0702095v1[cs:CR] 16 Feb 2007.
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM

More Related Content

What's hot

LSTM Tutorial
LSTM TutorialLSTM Tutorial
LSTM Tutorial
Ralph Schlosser
 
Modification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorialModification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorial
Alexander Decker
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
Pratik Poddar
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
decentralizeeverything
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
Mohammed Ashour
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
Srilal Buddika
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
Information Security Awareness Group
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
Mohamed Ramadan
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
IJNSA Journal
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET Journal
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
Universitas Pembangunan Panca Budi
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clustering
aiiniR
 
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
Mriganka Mandal
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
ijsptm
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
Srinadh Muvva
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
ijcncs
 

What's hot (19)

LSTM Tutorial
LSTM TutorialLSTM Tutorial
LSTM Tutorial
 
Modification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorialModification of some solution techniques of combinatorial
Modification of some solution techniques of combinatorial
 
Security Attacks on RSA
Security Attacks on RSASecurity Attacks on RSA
Security Attacks on RSA
 
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
1982 - Probabilistic Encryption & How To Play Mental Poker Keeping Secret All...
 
Homomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning ClassificationHomomorphic encryption and Private Machine Learning Classification
Homomorphic encryption and Private Machine Learning Classification
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
How to share a secret
How to share a secretHow to share a secret
How to share a secret
 
The rsa algorithm JooSeok Song
The rsa algorithm JooSeok SongThe rsa algorithm JooSeok Song
The rsa algorithm JooSeok Song
 
RSA Algorithm report
RSA Algorithm reportRSA Algorithm report
RSA Algorithm report
 
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
LATTICE BASED TOOLS IN CRYPTANALYSIS FOR PUBLIC KEY CRYPTOGRAPHY
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Genetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher EncryptionGenetic Algorithm in Hill Cipher Encryption
Genetic Algorithm in Hill Cipher Encryption
 
Pert 05 aplikasi clustering
Pert 05 aplikasi clusteringPert 05 aplikasi clustering
Pert 05 aplikasi clustering
 
Final Report-1-(1)
Final Report-1-(1)Final Report-1-(1)
Final Report-1-(1)
 
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...SECRYPT 2018  Presentation: 15th International Conference on Security and Cry...
SECRYPT 2018 Presentation: 15th International Conference on Security and Cry...
 
Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...Analysis and improvement of pairing free certificate-less two-party authentic...
Analysis and improvement of pairing free certificate-less two-party authentic...
 
RSA Algorithm
RSA AlgorithmRSA Algorithm
RSA Algorithm
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 

Viewers also liked

Close More Prospects With Edification That Works
Close More Prospects With Edification That WorksClose More Prospects With Edification That Works
Close More Prospects With Edification That Works
Kofi Ford
 
Mans flicker or god's flame
Mans flicker or god's flameMans flicker or god's flame
Mans flicker or god's flame
jb1955
 
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
Julia Volpe
 
How to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product designHow to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product design
Lindsay Bayuk
 
effective contract
effective contracteffective contract
effective contract
nkt96
 
Achievement
AchievementAchievement
Achievement
Bookie2610
 
The brook dried up
The brook dried upThe brook dried up
The brook dried up
jb1955
 
The Park DuValle Community Health Centers
The Park DuValle Community Health CentersThe Park DuValle Community Health Centers
The Park DuValle Community Health Centers
mhmaggie
 
The beast the dragon and the woman
The beast the dragon and the womanThe beast the dragon and the woman
The beast the dragon and the woman
jb1955
 
Family history project pt.1
Family history project pt.1Family history project pt.1
Family history project pt.1
Amanda Pohlman
 
Dimana hatimu
Dimana hatimuDimana hatimu
Dimana hatimu
Trsetiabudi
 
B2 book 22 - bruna rodrigues
B2   book 22 - bruna rodriguesB2   book 22 - bruna rodrigues
B2 book 22 - bruna rodrigues
Gerson Moura
 
Benefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement SystemsBenefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement Systems
Bruce Robinson
 

Viewers also liked (13)

Close More Prospects With Edification That Works
Close More Prospects With Edification That WorksClose More Prospects With Edification That Works
Close More Prospects With Edification That Works
 
Mans flicker or god's flame
Mans flicker or god's flameMans flicker or god's flame
Mans flicker or god's flame
 
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
GPS Flyer - Retail space - 20 ave A and 2nd street, NewYork, NY 10009
 
How to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product designHow to increase website conversions by applying the laws of great product design
How to increase website conversions by applying the laws of great product design
 
effective contract
effective contracteffective contract
effective contract
 
Achievement
AchievementAchievement
Achievement
 
The brook dried up
The brook dried upThe brook dried up
The brook dried up
 
The Park DuValle Community Health Centers
The Park DuValle Community Health CentersThe Park DuValle Community Health Centers
The Park DuValle Community Health Centers
 
The beast the dragon and the woman
The beast the dragon and the womanThe beast the dragon and the woman
The beast the dragon and the woman
 
Family history project pt.1
Family history project pt.1Family history project pt.1
Family history project pt.1
 
Dimana hatimu
Dimana hatimuDimana hatimu
Dimana hatimu
 
B2 book 22 - bruna rodrigues
B2   book 22 - bruna rodriguesB2   book 22 - bruna rodrigues
B2 book 22 - bruna rodrigues
 
Benefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement SystemsBenefits of Thin Film Measurement Systems
Benefits of Thin Film Measurement Systems
 

Similar to CAMINA GROUP FOR THE MOR CRYPTOSYSTEM

A1802040111
A1802040111A1802040111
A1802040111
IOSR Journals
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsEditor Jacotech
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
ijccmsjournal
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
ijccmsjournal
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
IDES Editor
 
I1803014852
I1803014852I1803014852
I1803014852
IOSR Journals
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
IJERA Editor
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Swati Nagpal
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
Editor IJCATR
 
Least cost rumor blocking in social networks
Least cost rumor blocking in social networksLeast cost rumor blocking in social networks
Least cost rumor blocking in social networksPing Yabin
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
ArthyR3
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
ijcisjournal
 
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPCNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
Sam Bowne
 
Suzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuz Fanous
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
IJNSA Journal
 
C0211822
C0211822C0211822
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET Journal
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
Sagun Man Singh Shrestha
 

Similar to CAMINA GROUP FOR THE MOR CRYPTOSYSTEM (20)

A1802040111
A1802040111A1802040111
A1802040111
 
Survey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithmsSurvey on asymmetric key cryptography algorithms
Survey on asymmetric key cryptography algorithms
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
Evaluation of Performance Characteristics of Polynomial based and Lattice bas...
 
I1803014852
I1803014852I1803014852
I1803014852
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
 
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
An Efficient Approach for Enhancing the Security of Amazigh Text using Binary...
 
Least cost rumor blocking in social networks
Least cost rumor blocking in social networksLeast cost rumor blocking in social networks
Least cost rumor blocking in social networks
 
Cs8792 cns - Public key cryptosystem (Unit III)
Cs8792   cns - Public key cryptosystem (Unit III)Cs8792   cns - Public key cryptosystem (Unit III)
Cs8792 cns - Public key cryptosystem (Unit III)
 
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEMPEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
PEC - AN ALTERNATE AND MORE EFFICIENT PUBLIC KEY CRYPTOSYSTEM
 
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLPCNIT 141 8. Public-Key Cryptosystems Based on the DLP
CNIT 141 8. Public-Key Cryptosystems Based on the DLP
 
Suzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_ThesisSuzan_Mohamad_Fanous_Thesis
Suzan_Mohamad_Fanous_Thesis
 
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTINGFAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
FAST DETECTION OF DDOS ATTACKS USING NON-ADAPTIVE GROUP TESTING
 
C0211822
C0211822C0211822
C0211822
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherNeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael Cipher
 
11
1111
11
 
11
1111
11
 

More from Editor IJMTER

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
Editor IJMTER
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
Editor IJMTER
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
Editor IJMTER
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
Editor IJMTER
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
Editor IJMTER
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
Editor IJMTER
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
Editor IJMTER
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
Editor IJMTER
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
Editor IJMTER
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
Editor IJMTER
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
Editor IJMTER
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
Editor IJMTER
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
Editor IJMTER
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
Editor IJMTER
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
Editor IJMTER
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
Editor IJMTER
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
Editor IJMTER
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
Editor IJMTER
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
Editor IJMTER
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
Editor IJMTER
 

More from Editor IJMTER (20)

A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIPA NEW DATA ENCODER AND DECODER SCHEME FOR  NETWORK ON CHIP
A NEW DATA ENCODER AND DECODER SCHEME FOR NETWORK ON CHIP
 
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
A RESEARCH - DEVELOP AN EFFICIENT ALGORITHM TO RECOGNIZE, SEPARATE AND COUNT ...
 
Analysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX EnvironmentAnalysis of VoIP Traffic in WiMAX Environment
Analysis of VoIP Traffic in WiMAX Environment
 
A Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-DuplicationA Hybrid Cloud Approach for Secure Authorized De-Duplication
A Hybrid Cloud Approach for Secure Authorized De-Duplication
 
Aging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the InternetAging protocols that could incapacitate the Internet
Aging protocols that could incapacitate the Internet
 
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
A Cloud Computing design with Wireless Sensor Networks For Agricultural Appli...
 
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMESA CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
A CAR POOLING MODEL WITH CMGV AND CMGNV STOCHASTIC VEHICLE TRAVEL TIMES
 
Sustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building MaterialSustainable Construction With Foam Concrete As A Green Green Building Material
Sustainable Construction With Foam Concrete As A Green Green Building Material
 
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TESTUSE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
USE OF ICT IN EDUCATION ONLINE COMPUTER BASED TEST
 
Textual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative AnalysisTextual Data Partitioning with Relationship and Discriminative Analysis
Textual Data Partitioning with Relationship and Discriminative Analysis
 
Testing of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different ProcessorsTesting of Matrices Multiplication Methods on Different Processors
Testing of Matrices Multiplication Methods on Different Processors
 
Survey on Malware Detection Techniques
Survey on Malware Detection TechniquesSurvey on Malware Detection Techniques
Survey on Malware Detection Techniques
 
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICESURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICE
 
SURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODSSURVEY OF GLAUCOMA DETECTION METHODS
SURVEY OF GLAUCOMA DETECTION METHODS
 
Survey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor NetworkSurvey: Multipath routing for Wireless Sensor Network
Survey: Multipath routing for Wireless Sensor Network
 
Step up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor DriveStep up DC-DC Impedance source network based PMDC Motor Drive
Step up DC-DC Impedance source network based PMDC Motor Drive
 
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATIONSPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
SPIRITUAL PERSPECTIVE OF AUROBINDO GHOSH’S PHILOSOPHY IN TODAY’S EDUCATION
 
Software Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing SchemeSoftware Quality Analysis Using Mutation Testing Scheme
Software Quality Analysis Using Mutation Testing Scheme
 
Software Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global AnalysisSoftware Defect Prediction Using Local and Global Analysis
Software Defect Prediction Using Local and Global Analysis
 
Software Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking SchemeSoftware Cost Estimation Using Clustering and Ranking Scheme
Software Cost Estimation Using Clustering and Ranking Scheme
 

Recently uploaded

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
top1002
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 

Recently uploaded (20)

Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Basic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparelBasic Industrial Engineering terms for apparel
Basic Industrial Engineering terms for apparel
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 

CAMINA GROUP FOR THE MOR CRYPTOSYSTEM

  • 1. Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com @IJMTER-2014, All rights Reserved 144 e-ISSN: 2349-9745 p-ISSN: 2393-8161 CAMINA GROUP FOR THE MOR CRYPTOSYSTEM Akshaykumar Meshram1 , Dr. N.W.Khobragade2 Ph.D Scholar1 , Professor2 1, 2 Department of Mathematics, R.T.M. Nagpur University, Nagpur (M.S.), India Abstract— In this paper we study of the MOR cryptosystem using camina group. We show that using the automorphism of the camina group one can build a secure MOR cryptosystem. Keywords- MOR cryptosystem, Camina group, Discrete Logarithm Problem, Diffie- Hellman problem, ElGamal cryptosystem. I. INTRODUCTION The digital system has brought revolutionary changes in every walk of life. The data storage, its processing and the outcome are the major stages in it. Naturally security of the same is a quite concern in this matter. Cryptography, which basically writing codes and solving codes, has worked out justifiable solution to the problem of security of the digital data. A Principal Goal of (Public Key) Cryptography is to allow two people to exchange confidential information, even if they have never met and can communicate only viaa channel that is being monitored by an adversary. There are three cryptosystems widely in use today: 1) RSA(Ron Rivest, Adi Shamir and Leonard Adleman). 2) The El-Gamal or the Diffie-Hellman key exchange protocol over the multiplication group of a finite field. 3) The El-Gamal or the Diffie -Hellman key exchange protocol over the group of points on an Elliptic curve over a finite field. The security type of the 1st and 2nd is the same. The best known attack against them, the index calculus method, is sub-exponential in nature. On the other hand, the best known attack against 3rd is exponential in nature. Today, some cryptographers try to build public key cryptosystems based on non-abelian groups with the security expected at least as secure as Elliptic curve cryptosystems. Discrete Logarithm Problem (DLP) is the famous problem in cryptography. It is the complexity of DLP, which is the base of most commonly, used cryptosystem like the ElGamal cryptosystems over finite field or Elliptic curve cryptosystems. The algebraic groups used in such cryptosystems are abelian (commutative). There are many ones based on DLP other than ElGamal and Elliptic cryptosystems. Among them, we studied the MOR cryptosystem over the automorphism group Aut(G) of a non-abelian group G.
  • 2. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 145 II. PRELIMINARIES Most of the definition used in these papers is standard. 2.1 Discrete Logarithm Problem {DLP}: The (discrete) exponentiation problem is as follows: Given a base a, an exponent b and a modulus p, calculate c such that ab ≡ c (mod p) and 0 ≤ c < p. It turns out that this problem is fairly easy and can be calculated "quickly" using fast- exponentiation. The discrete log problem is the inverse problem: Given a base a, a result c (0 ≤ c < p) and a modulus p, calculate the exponent b such that ab ≡ c (mod p). It turns out that no one has found a quick way to solve this problem. To get an intuition as to why this is the case, try picking different values of a and p, and listing out each successive power of a mod p. What you will find is that there is no discernable pattern for the list of numbers created. Thus, given a number on the list, it's very difficult to predict where it appears on the list. 2.2 ElGamal Cryptosystem: Let q be a prime such that the discrete logarithm problem in (Zq,) is infeasible and let Zq be a primitive element. Let P=Zq, C=Zq×Zq, and define K={(q, , XB, YB): YB= BX mod q}. The values q,  and YB are the public key and XB is the private key. For K= (q,, XB, YB), and for a (secret) random number kZq-1, define ek(x, k)=(C1, C2) Where C1=k mod q C2= x k BY mod q For C1 and C2Zq , define k (C1, C2)=C2 1 1( )BX C  mod q 2.2 Camina Group: A group G is called a Camina group if ≠ , and for each ∈ ′ the following equation holds:
  • 3. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 146 = { }, where = { ∈ } is the conjugacy class of x in G and x{G’} denotes the set { / ′ ∈ ′ }. It is well know that, 1) In Camina group the equality = { ′ } 2) In an arbitrary group ⊆ { ′} for each . III. THE MOR CRYPTOSYSTEM In this section we discuss the MOR cryptosystem. The concept of the MOR cryptosystem was first proposed in Crypto2001 by Paeng et al[2].There are two different security concepts used in [2]. a) The discrete logarithm problem in the group of inner automorphisms. b) Membership problem in a finite cyclic group. The MOR cryptosystem is a generalization of ElGamal cryptosystem, where the discrete logarithm problem works in the automorphism group of a group G, instead of the group G itself. Later in same year, Paeng et al [3], they generalized the MOR cryptosystem and study this new system for non abelian group. In 2003, Seong-Hun Paeng [4] shows that there are subexponential time algorithms to solve the DLP in inner automorphism groups for some non-abelian groups. 3.1 Description of the MOR cryptosystem: Alice’s keys are as follows: Public Key: ∅ and ∅ , ∈ ℕ. Private Key: m. Encryption a) To send a message ∈ Bob computes ∅ and ∅ for a random ∈ ℕ. b) The ciphertext is (∅ , ∅ (a)). Decryption Alice knows m, so if she receives the ciphertext (∅ , ∅ (a)), she computes ∅ from ∅ and then ∅ and then from ∅ (a) computes ‘a’. Alice can compute ∅ in two ways, a) If she has the information necessary to find out the order of the automorphism ∅ then she can use the identity ∅ = ∅ whenever ∅ = 1. b) She can find out the order of some subgroup in which ∅ belongs and use the same identity.
  • 4. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 147 IV. The MOR cryptosystem using Camina group Camina groups were introduced by A.R.Camina in [5]. The standard definition of camina group mention above and this group had been extensively studied R. Dark, C.M. Scoppola in [6]. Aayn Mahalanobis elaborately explained that the currently group for the MOR cryptosystem [2] is 2, × .The automorphisms proposed is inner autotomorphism. It is shown in [4] that the DLP in the group of inner autotomorphism of 2, × in the same as the DLP in 2, . So here we consider map ∅: → be an automorphism of camina group and the map ∅: ∅( ) → ∅( ) . Theorem: A finite non abelian group G is a Camina group if and only if G is a Camina p-group of nilpotance class. In 2010, Marcel Herzog [7], shows that if G is non abelian polycyclic by finite camina group, then is finite and if G is non abelian locally finite camina group, then the of the following hold a) is a p-group, for suitable prime p. b) is a nilpotent group, and either is p-group or is a localy cyclic group. Also if G is non-abelian camina group, then if ( ) is finite then G is finite and if ( ) is a locally finite p-group, then G is a locally finite p-group. In 2007 Aayn Mahalanobis[8], show that MOR cryptosystem over finite p-group is only as secure as the ELGamal have cryptosystem over finite field. On using automorphism of camina group, we can make secure MOR cryptosystem as this group can reduce into p-group and using fact that, If G is a camina group, ∈ ′ and ∈ ′ then = for some ∈ . ′ = ( ) ′ = ( ) ′ = ( [ , ]) ′ = ′ and from | | = ℎ ≡ 1( ) Since, , ∈ ′ implies < >=< > for some ∈ and = ( ) for some integer n. Using above fact one can build secure MOR cryptosystem using camina group as it can be reduce to p-group and it is depending upon the value of ∈ ′ which is very difficult to break such cryptosystem. V. Conclusion The objective of this paper is to study camina group for the MOR cryptosystem. It is prove that by using camina group one can build secure MOR cryptosystem. The security of any proposed cryptosystem matter of challenge and more work need to be done for security of the given system.
  • 5. International Journal of Modern Trends in Engineering and Research (IJMTER) Volume 01, Issue 05, [November - 2014] e-ISSN: 2349-9745, p-ISSN: 2393-8161 @IJMTER-2014, All rights Reserved 148 Acknowledgements The authors would like to thank anonymous reviewers of International Journal of Modern Trends in Engineering and Research for their careful and helpful comments. Reference [1] Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman, An introduction to mathematical cryptography, Springer, 2008. [2] S.-H. Paeng, K.-C. Ha, J. Kim, S. Chee, C. Park, New public key cryptosystem using finite non abelian groups, in: Advances in Cryptology-Crypto, 2001, pp. 470–485. [3] S.-H. Paeng, D. Kwon, K.-C. Ha, J. Kim, Improved public key cryptosystem using finite non abelian groups, IACR ePrint 2001/066. [4] Seong-Hun Paeng ,On the security of cryptosystem using automorphism groups, Information Processing Letters 88 (2003) 293–298 [5] A.R. Camina, Some conditions which almost characterize Frobenius groups, Israel J. Math 31 (1978), 153–160. [6] R. Dark, C.M. Scoppola, On Camina groups of prime power order, J. Algebra 181 (1996), 787– 802. [7] Marcel Herzog, on infinite Camina groups, Tel-aviv university 2010 [8] Aayn Mahalanobis, A note on using finite non-abelian p-groups in the MOR cryptosystem , arXiv:cs/0702095v1[cs:CR] 16 Feb 2007.