Original Research Article

Article volume = 2024 and issue = 2

Pages: 136–151

Article publication Date: August 07, 2024

You can download PDF file of the article here: Download

Visited 60 times and downloaded 24 times

A New Useful Efficient Text Encryption by a Finite Field

Özen ÖZER(a), Hana Ali-Pacha(b), Adda Ali-Pacha(c), Naima HADJ-SAID(c)

(a) Quartz Laboratory, ECAM-EPMI, 13 Bd de l’Hauli 95092 Cergy Pontoise Cedex, France.

(b) Krklareli University, Fac. Science and Arts, Dept of Mathematics, Kayal Campus, Kirklareli, TURKEY.

(c) LACOSI laboratory, University of Sciences and Technologies of Oran, Mohamed Boudiaf, Algeria.


Abstract:

Cryptology has experienced significant advancement in the development of computer systems. They are artisanal and confidential era to very high-tech systems requiring remarkable computing power. In this paper, we propose a new useful efficient text encryption system. Firstly, we build a new alphabet of 89 characters including the Arabic and Latin alphabets with the numbers of the decimal base as well as some punctuation with specific symbols. Our cryptosystem is based on the principle established by Shannon that a good cryptosystem must satisfy the principles of confusion and diffusion like any modern encryption system. In order to make it harder to break we come up with a concatenation of some substitutions that relies on the use of the Hill cipher surrounded by two different affine ciphers. The diffusion is a permutation of 89-symbols blocks and it is a dynamic permutation carried out using the logistic map under an appropriate program. Knowing that 89 is a prime number, so all calculations are in the algebraic quotient set Z/89Z. The key space is of around 2197 bits which is very large to make a brute force attack impossible. That is why paper is useful and significant both in science and real life.

Keywords:

Text Encryption, Hill Cipher, Affine Cipher, Permutation Cipher, Logistic Map, Algebraic Finite Fields, Prime number.


References:
  • [1] Akgül A., Kaçar S., Aricolu B. and Pehlivan ., Text encryption by using one-dimensional chaos generators and nonlinear equations, 8th International Conference on Electrical and Electronics Engineering (ELECO),2013 (2013), doi: 10.1109/ELECO.2013.6713853, pp. 320-323. 3
  • [2] Alhomdy S. A., Abdullah Saleh N. , Dynamic Permutations, Global Journal of Computer Science and Technology: C Software & Data Engineering Volume 15 Issue 1, 2015 (2015). 3.1.3
  • [3] Baby H. T., Sujatha B.R., Voice and Text Encryption using Chaotic Circuits, International Journal of Innovative Technology and Exploring Engineering (IJITEE), DOI: 10.35940/ijitee.F7915.049620, Vol.9 Issue-6, pp.1181-1184, April 2020 (2020). 3
  • [4] Bibhudendra A., Saroj Kumar P., Sarat Kumar P., and Ganapati P., Image Encryption Using Advanced Hill Cipher Algorithm, Int. J. of Recent Trends in Engineering and Technology, Vol. 1, No. 1, 1-11, 2009 (2009). 1
  • [5] Devaney, L., A First Course in Chaotic Dynamical Systems, Westview Press (Oct. 21st, 1992 (1992)), Edition, 321 pages, Studies in Nonlinearity. 3.1.2
  • [6] Hill Lester S , Cryptography in an Algebraic Alphabet, American Mathematical Monthly, 36,1929 (1929) pp.306-312, http://links.jstor.org/sici?sici=0002-9890%28192906%2F07%2936%3A6%3C306%3ACIAAA%3E2.0.CO%3B2-J 1, 3.2.1
  • [7] Irsan M Y T and Antoro S C, Text Encryption Algorithm based on Chaotic Map, The 3rd International Conference in Science, Journal of Physics: Conference Series, doi:10.1088/1742-6596/1341/6/062023, Vol. 1341 (062023), 2019 (2019). 3
  • [8] Leelasantitham A. and Kiattisin S., Text Encryption and Decryption of DICOM File Header using Jerk Chaotic Attractor, International Journal of Applied Biomedical Engineering,2013 (2013), Vol.6, No.1, pp.56-63. 3
  • [9] Lewand R. E., Cryptological Mathematics, the Mathematical Association of America, 2000 (2000). 3.2
  • [10] Loxton J. H. (1990), Number Theory and Cryptography, (London Mathematical Society Lecture Note Series Book 154), 1st Edition, Kindle Edition, 1990 (1990). 248 pages, Cambridge University Press. 3.2.1
  • [11] Mathivadhana E., Sivasankari K.,A Comparative Study of Matrix Encoding and Hill Cipher Algorithm, International Journal of Scientific Research in Science and Technology (IJSRST),2018 (2018), Volume 4, Issue 5, .pp.813-816, DOI: https://doi.org/10.32628/IJSRST1845189. 2, 3.2.1
  • [12] Menon U., Hudlikar A. and Menon A. R., A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm, (IJACSA) International Journal of Advanced Computer Science and Applications,2020 (2020), Vol. 11, No. 10. 3
  • [13] Nigel Paul Smart, Cryptography: An Introduction, McGraw-Hill College, December 30, 2004 (2004), 433 pages. 1, 1, 3.1, 3.2
  • [14] Qasim, Hayder A.Text Encryption Method Using multi Hyper-chaotic systems, Al-Qadisiyah Journal of Pure Science, 2021 (2021), Vol. 26: No. 3, https://doi.org/10.29350/qjps.2021.26.3.1307. 3
  • [15] Sawant Laxman S., Patil Shankar A., Cryptography and Image Processing by Matrices, International Research Journal of Engineering and Technology (IRJET), Vol:7, No:8, 4327-4330, 2020 (2020). 3.2.1
  • [16] Sekhan, R., Bloom, R, Applied Finite Mathematics. Libretexts, 2020 (2020). 3.2.1, 3.2.2
  • [17] Strogatz Steven, Nonlinear dynamics and Chaos, 505 pages, Studies in Nonlinearity: Perseus Books Reading Massachusetts, April 1994 (1994). 3.2.1
  • [18] Thangarasu N., Arul Lawrence Selva Kumar Encryption Using Lester Hill Cipher Algorithm, International Journal of Innovative Research in Advanced Engineering (IJIRAE), Issue 12, Volume 2, 2015 (1015). 3.2.1
  • [19] Volos Ch. K., I. Kyprianidis M., and Stouboulos I. N., Text Encryption Scheme Realized with a Chaotic Pseudo- Random Bit Generator, Journal of Engineering Science and Technology Review, Special Issue on Recent Advances in Nonlinear Circuits: Theory and Applications, Vol.6, Nˇr.4, pp.9 14, 2013 (2013). 3
  • [20] Zeriah M., Chillali A., Boua A., Cryptography Based on Matrices, Boletim da Sociedade Paranaense de Matemática, Vol.37, No:3, 75-83, 2019 (2019). 3.2.1
Cite this article as:
  • Özen ÖZER, Hana Ali-Pacha, Adda Ali-Pacha, Naima HADJ-SAID, A New Useful Efficient Text Encryption by a Finite Field, Communications in Combinatorics, Cryptography & Computer Science, 2024(2), PP.136–151, 2024
  • Export citation to BibTeX