Professional Documents
Culture Documents
An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine
An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine
An Elgamal Encryption Scheme of Fibonacci Q-Matrix and Finite State Machine
Abstract- Cryptography is the science of writing messages in The Fibonacci theory of numbers [8][9][10][11][12]
unknown form using mathematical models. In Cryptography, ascertained the possibility of new applications for scientific
several ciphers were introduced for the encryption schemes. results as seen in the last few decades.
Recent research focusing on designing various mathematical The following (2X2) square matrix was received in [10]
models in such a way that tracing the inverse of the designed [13]:
mathematical models is infeasible for the eve droppers. In the
present work, the ELGamal encryption scheme is executed
1 1
using the generator of a cyclic group formed by the points on Q (1)
choosing elliptic curve, finite state machines and key matrices 1 0
obtained from the Fibonacci sequences. The nth power of the Q-matrix was proven [10] [14]:
Keywords : ElGamal, Fibonacci sequence, Finite state F Fn
machine, encryption, decryption. Q n n 1 , (2)
Fn Fn 1
I. I NTRODUCTION Where n 0,1,2,................Fn1 , Fn , Fn1 are the
Fibonacci numbers.
Victor Miller and Neal Koblitz first proposed Elliptic curve The recurrence relation:
cryptography, in the year 1985. Elliptic curve cryptography is Fn1 Fn Fn1 (3)
not a new technology and has proven its security by standing
with a generation of attacks. In the recent years, as the With the initial conditions are: F1 F2 1 (4)
wireless industry has grown, the numerous companies have The determinant Q-matrix in (2) can be proved coinciding
adopted Elliptic curve cryptography as an innovative security with Cassini formula using (3) and (4).
DetQ n Fn 1 Fn 1 Fn (1) n
2
technology. Elliptic curve employs a relatively short (5)
encryption key and the short key is faster and requires less
Consider the multiplicative group M2 the set of all 2 2
compelling power than the other first-generation encryption,
Matrices over the set of all real numbers.
public key algorithm a ‘160’-bit Elliptic curve
If n=1, equation (6) reduced as
cryptography, encryption key provides the same security as
0 1
‘1024’-bit RSA encryption key [1] [2] [3] [4] . Q1 (7)
The equations of the elliptic curves take the following 1 1
form, known as Weierstrass equation [6]: The extension to the above matrix is as follows [14]:
y 2 gxy hy x 3 ix 2 jx k , where g, h, i, j, k are real Fn 1 Fn 0
numbers and x, y take on values in the real numbers. The (8)
Q2 Fn Fn 1 0
n
13
Computer Science Section
14
Journal of Applied Computer Science & Mathematics, no. 20 (9) /2015, Suceava
15
Computer Science Section
TABLE 1
S. I/P Previous Preset O/P n= Secure key Cipher text
No. State State O/P+1 = ( Fib. recurence Matrix ) n
1 1 q0 q1 1 2
5 8 0 (140,260) (73,226) (126,260)
8 13 0 (262,139) (108,10) (15,98)
0 0 1 (109,244) (161,31) (54,268)
2 1 q1 q3 3 4
89 144 0 (140,260) (73,226) (126,260)
144 233 0 (262,139) (108,10) (15,98)
0 (109,244) (161,31) (54,268)
0 1
3 0 q3 q2 2 3
21 34 0 (221,210) (5,260) (126,260)
34 55 0 (126,260) (6,36) (15,98)
0 (51,226) (229,51) (54,268)
0 1
4 1 q2 q1 1 2
5 8 0 (64,25) (119,211) (126,260)
8 13 0 (55,178) (56,2) (15,98)
0 (43,10) (65,141) (54,268)
0 1
5 0 q1 q2 2 3
21 34 0 (153,151) (88,101) (126,260)
34 55 0 (54,3) (209,240) (15,98)
0 (157,268) (213,2) (54,268)
0 1
6 1 q2 q1 1 2
5 8 0 (134,51) (28,57) (126,260)
8 13 0 ( 71, 27 ) (182 ,258) (15,98)
0 (107,173) (256,259) (54,268)
0 1
7 1 q1 q3 3 4
89 144 0 (163,71) (17,64) (126,260)
144 233 0 (98,238) (157,3) (15,98)
0 (15,109) (93,5) (54,268)
0 1
8 1 q3 q3 3 4 89 144 0 (150,222) (235,228) (126,260)
144 233 0 (85,72) (149,98) (15,98)
0 0 1 (173,23) (54,268)
(5,260)
16
Journal of Applied Computer Science & Mathematics, no. 20 (9) /2015, Suceava
C 9 (54,268) (132,248) (215,157) (213,269), [7] An introduction to the theory of elliptic curves by Joseph
H.Silverman brown University and NTRU
Step12: Now Alice sends the encrypted message Cryptosystems2006.
consisting of pair of points [8] Vorobyov NN. Fibonacci numbers. Moscow: Nauka; 1978 [in
Russian].
{(250 , 189), (269,114) ), ((250 , 189) , (91,244) ), [9] Hoggat VE. Fibonacci and Lucas numbers. Palo Alto, CA:
Houghton- Mifflin; 1969.
((250 , 189) , (209,240) ), ((250 , 189) , (242,57), [10] S. Fibonacci and Lucas numbers and the golden section.
((250 , 189) , (76,228), ((250 , 189) , (88,101)), Theory and applications Ellis Horwood limited; 1989.
[11] Stakhov AP. Introduction into algorithmic measurement
((250 , 189) , (163,71), ((250 , 189) , (31,178)), theory. Moscow: Soviet Radio; 1977 [in Russian].
((250 , 189) , (213,269)} [12] A.P. Stakhov, “The ‘‘golden’’ matrices and a newkind of
cryptography”, Chaos, Solutions and Fractals 32 (2007)
to Bob. pp1138–1146.
[13] Stakhov AP. A generalization of the Fibonacci Q-matrix. Rep
B. Decryption Natl Acad Sci Ukraine1999 (9):46 9.9(9)46-49.
[14] K.R.Sudha, A. Chandra Sekhar, Prasad Reddy P VG D
Bob applies the reverse process and recovers the message “Cryptography Protection of Digital Signals using Some
Recurrence Relations” International Journal of Computer
“LIKE”. Science andNetwork Security,Vol.7 No.5, May 2007.
[15] Adesh K.Pandey reprint 2009, “An introduction to automata
IV. CONCLUSIONS theory and formal languages S.K.Karana & sons. New Delhi.
[16] Johan E.Hopcroft, Rajeev Motwin, Jeffrey D.Uiman.
In the proposed work, the plain text is converted to points “Introduction to automata theory, language, and computation”
on the elliptic curve by one to one correspondent and ASCII Vanstone 3 rd impression, 2007 CRC press, Dorling
characters. The secret key has generated using matrix Kindersley (India) Pvt.Ltd.
[17] T.ElGamal,“A public-key cryptosystem and a signature
obtained from the Fibonacci sequence. The encryption
scheme based on discrete logarithms ” IEEE Transactions on
process uses the finite state machines and the key generation Information Theory, onInformation Theory, 469-472, 1985.
process uses the ELGamal encryption taking security, [18] P.A.Jyotirmie, B.Ravi Kumar, A.Chandra Sekhar,S.Uma Devi
confidentiality and authenticity into consideration “A one to one Correspondence inelliptic curve cryptography”
InternationalJournal of Mathematical archive-4(3), 2013:300-
REFERENCES 304.
[19] http://www.certicom.com/index.php/ecc-tutorial.
[1] N.Koblitz. Elliptic curve Cryptosystems. Mathematics of [20] B.Ravi Kumar, A. Chandra Sekhar, G.Appala Naidu “An
computation, 48, 203-209, 1987. ElGamal Encryption Scheme of Adjacency Matrix and
[2] A textbook of Guide to elliptic curve cryptography by Darrel Finite Machines” COMPUSOFT, An international Journal of
Hancott Vanstone 1965. advanced computer technology, Volume 4, Issue 3, March
[3] N. Koblitz. Hyper Elliptic Cryptosystem. International Journal 2015, pages 1548-1554.
of Cryptography, 1,139-150,1989. [21] B.Ravi Kumar, A. Chandra Sekhar, G.Appala Naidu “A
[4] A Course in Number Theory and Cryptography. By Neal Novel ElGamal Encryption Scheme of Elliptic Curve
Koblitz, 1994. Cryptography” International Journal of Computer Trends and
[5] V. Miller. Uses of Elliptic Curves in Cryptography. In Technology, Volume 20, Number 2, Feb 2015, pages 70-73.
Advances in Cryptology (CRYPTO-1985). [22] B.Ravi Kumar, A. Chandra Sekhar, G.Appala Naidu “An
[6] A textbook of Cryptography and Network Security by William Elgamal Encryption of Finite State Machines and points on
Stallings, 2011. the Elliptic Curve” Journal of theoretical Physics &
Cryptography, Volume 9, July 2015, pages 1-5.
B.Ravi Kumar is presently working as Assistant Professor in the Department of Engineering Mathematics. He is pursuing his PhD
in number theory and Cryptography under the guidance of A.Chandra Sekhar.
A.Chandra Sekhar received his PhD degree in number theory from JNT University and M.Sc., degree with specialization in
algebraic number theory from Andhra University. He secured the prestigious K.NAGABUSHANAM memorial award in M.Sc., for
obtaining University first rank. He did his MPhil from Andhra University in 2000. He was with Gayatri Degree College during 1991 to
1995 and later joined GITAM Engineering College in 1995. Presently he is working as Professor & BOS Chairman of the Department
of Engineering College, Visakhapatnam, INDIA.
G.Appala Naidu is Professor Department Mathematics, College of science & Technology, Andhra University, Visakhapatnam,
INDIA. He works in the areas of fixed-point theory and number theory and Cryptography. He published papers in reputed journals of
national and international.
17