Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

Two Level Encryption based on One Time Pad and Koblitz Method of Encoding

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 122 - Number 15
Year of Publication: 2015
Authors:
Jayashree Katti
Santoshi Pote
B. K. Lande
10.5120/21773-5041

Jayashree Katti, Santoshi Pote and B K Lande. Article: Two Level Encryption based on One Time Pad and Koblitz Method of Encoding. International Journal of Computer Applications 122(15):1-5, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Jayashree Katti and Santoshi Pote and B. K. Lande},
	title = {Article: Two Level Encryption based on One Time Pad and Koblitz Method of Encoding},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {122},
	number = {15},
	pages = {1-5},
	month = {July},
	note = {Full text available}
}

Abstract

With the advent of technology, traditional encryption techniques are facing challenges in key distribution and protection. This paper proposes a novel method of encryption using one time pad and elliptic curve cryptography. Given plain text will be encrypted using one time pad. The resulting cipher text will be encoded using Koblitz method of encoding. This paper describes Koblitz's method to represent a message to a point and point to message. It is already well known that one time pad is unbreakable cipher and is used when highest form of security is desired. The problem of key distribution and protection will be solved using elliptic curve cryptography.

References

  • Nithin Nagaraj, "Short communicationOne-Time Pad as a nonlinear dynamical system"Amrita Vishwa Vidyapeetham, Amritapuri Campus, India,Elsevier, http://dx. doi. org/10. 1016/j. cnsns. 2012. 03. 020
  • Shannon CE. Communication theory of secrecysystems. Bell Syst Tech J 1949;28:656–715
  • Shannon CE. A mathematicaltheory of communication. Bell Syst Tech J 1948; 27:379–423
  • Tarun Narayan Shankar, G. Sahoo, "Cryptography with Elliptic Curves", International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 2009,ISSN: 0974-1003
  • Menezes A, van Oorschot PC, Vanstone S. Handbook of applied cryptography. Boca Raton, FL: CRC Press; 1996
  • Nithin Nagaraj and Vivek Vaidya "Re-visiting the One-Time Pad", International Journal of Network Security, Vol. 6, No. 1, PP. 94–102, Jan. 2008
  • Kimmo Jarvinen and Jorma Skytta, "Fast point multiplication on Komblitz curves: Parallelization method and implementations", Elsevier, Microprocessors and Microsystems, Volume 33, Issue 2, March 2009, Pages 106-116, doi:10. 1016/j. micpro. 2008. 08. 002
  • Shukla, R. and Prakash, H. O. , "Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem", IEEE Conference: International Conference on Machine Intelligence and Research Advancement , 2013 ,Pages: 174 - 178, DOI: 10. 1109/ICMIRA. 2013. 40
  • Borowski, M. , Lesniewicz, M. ,"Modern usage of old one-time pad", IEEE Conference :Communications and Information Systems 2012,Pages: 1 – 5, ISBN: 978-1-4673-1422-0.
  • Songsheng Tang and Fuqiang Liu,"A one time pad encryption algorithm based on one-way hash and conventional block cipher", IEEE Conference: 2nd International Conference on Consumer Electronics, Communications and Networks , 2012 Pages: 72 - 74, DOI: 10. 1109/CECNet. 2012. 6201917
  • Boruah, D. ; Saikia, M. , "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C", IEEE Conference: International Conference on Information Communication and Embedded Systems , 2014, Pages: 1 - 7, DOI: 10. 1109/ICICES. 2014. 7033751