CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Three Novel Theorems for Applied Cryptography

by Rahul Yadav, Deepak Chaudhary
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 13
Year of Publication: 2013
Authors: Rahul Yadav, Deepak Chaudhary
10.5120/12948-0090

Rahul Yadav, Deepak Chaudhary . Three Novel Theorems for Applied Cryptography. International Journal of Computer Applications. 74, 13 ( July 2013), 31-37. DOI=10.5120/12948-0090

@article{ 10.5120/12948-0090,
author = { Rahul Yadav, Deepak Chaudhary },
title = { Three Novel Theorems for Applied Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 13 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-37 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number13/12948-0090/ },
doi = { 10.5120/12948-0090 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:13.125112+05:30
%A Rahul Yadav
%A Deepak Chaudhary
%T Three Novel Theorems for Applied Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 13
%P 31-37
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With advancements in computing capabilities public key cryptosystems are going to be more complex yet vulnerable over the modern day's computer networks and associated security mechanism, especially those based on novel approaches of applied mathematics. This paper explores three novel theorems derived while studying and implementing RSA algorithm, one of the strongest public key cryptosystem. The proposed Theorems are best suited and adequate for RSA algorithm yet being applicable to some of other existing algorithms and theorems of applied mathematics. The first theorem deals with concept of ambiguity while calculating multiplicative inverse of encryption key which in some of instances returns undesirable negative numbers not useful as decryption key . Second theorem deals with unconcealed multiplicative inverses, unconcealed are values which remain unchanged after any mathematical transformations. Concept of unconcealed multiplicative inverses is useful in key generation for RSA cryptosystem. Third theorem deals with the concept of unconcealed exponentiation modulo quite useful in finding unconcealed signature and messages to form UM Matrix for RSA.

References
  1. Miller, Gary L. (1976), "Riemann's Hypothesis and Tests for Primality", Journal of Computer and System Sciences 13 (3): 300–317, http://dx. doi. org/10. 1145%2F800116. 803773, Ret May 2013.
  2. Stallings, William. Computer Organization and Architecture: Designing for performance, Ninth Edition. ISBN 978-0132936330, New Jersey: Prentice-Hall, Inc. 2012.
  3. Kasana, H. S. , Complex Variables: Theory And Applications (3rd ed. ), PHI Learning Pvt. Ltd, ISBN 978-8120326415, 2005
  4. R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems"; Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge; 1978.
  5. Paul Pritchard, "Improved Incremental Prime Number Sieves", Algorithmic Number Theory Symposium, pp. 280–288, 1994.
  6. Wikipedia, the free encyclopedia; Bézout's identity, Modular multiplicative inverse, extended Euclidean algorithm; @ http://en. wikipedia. org/wiki/; ret. June 2013.
  7. Riesel, Hans, Prime Numbers and Computer Methods for Factorization (second edition), Boston: Birkhäuser, ISBN 0-8176-3743-5, 1994.
  8. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein. Introduction to Algorithms, Third Edition. MIT Press and McGraw-Hill, ISBN 978-0262033848. Greatest common divisor. July 2009.
  9. Singh, S. The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. New York: Anchor Books, 1999
  10. Gauss, Carl Friedrich; Maser, H. (translator into German) (1965), Untersuchungen uber hohere Arithmetik (Disquisitions Arithmetical & other papers on number theory) (Second edition), New York: Chelsea, ISBN 0-8284-0191-8.
  11. Branchaud, Marc, "A Survey of Public-key Infrastructures", Department of Computer Science, McGill University, Montreal, 1997.
  12. P. Gabrini; CodeWarrior Principles of Programming, Chapter 3. Algorithm, Metrowerks CodeWarrior, Metrowerks Inc. @info. uqam. ca/Members/gabrini_p/ Principles_of_Programming. pdf, Ret. June 2013.
  13. Zeliade W. P. ; Model Validation: theory, practice and perspectives. Zeliade White. May, 2011
  14. John Baez; "The Foundations of Applied Mathematics", Theoretic Foundations of Mathematics Workshop @ math. ucr. edu/home/baez/irvine/irvine. pdf. May 2013.
  15. Rahul Yadav, Direndra Yadav, Hriday Gupta, "RSA Operations With Performance Tuning"; Proceedings of ICNICT 2011, KIET, Ghaziabad, Sep 2011.
  16. William Stallings, "Cryptography and Network Security, Principles and Practice", Sixth edition; ISBN 978-0133354690, Prentice Hall, March 2013.
  17. Lemars; Using Multiplicative Inverses to Solve Equations, Lesson 5. 6 Pg. 247. Nov. 2012. @ lemars. k12. ia. us/webfiles/~/Source/J9B05FAD. pdf.
  18. Boute, Raymond T, "The Euclidean definition of the functions div and mod". ACM Transactions on Programming Languages and Systems (TOPLAS) (ACM Press (New York, NY, USA)) 14 (2): 127–144. http://dx. doi. org/10. 1145%2F128861. 128862, April 1992.
Index Terms

Computer Science
Information Sciences

Keywords

Quarter division of Ring Unconcealed Transformation Ambiguous Values Bézout's identity Extended Euclid algorithm