A Novel Asymmetric Encryption Technique Using Onto Functions

Authors

DOI:

https://doi.org/10.26713/cma.v15i5.2844

Keywords:

Onto function, Cryptography, Encryption, Decryption, Hill ciphers, Matrices

Abstract

The concept of onto functions plays a very important role in the theory of Analysis and has got rich applications in many engineering and scientific techniques. In this paper, we are proposing a new application in the field of cryptography by using onto functions on the algebraic structures like rings like \((\mathbb{Z}_m,+_m,X_m)\) and fields like \((\mathbb{Z}_p,+_p,X_p)\) to get a strong encryption technique. A new asymmetric cryptographic system based on Hill ciphers is developed using onto functions with two keys- Primary and Secondary, to enhance the security. This is the first algorithm in cryptography developed using onto functions which ensures a strong security for the system while maintaining the simplicity of the existing Hill cipher. The concept of using two keys is also novel in the symmetric key cryptography. The usage of onto functions in the encryption technique eventually gives the highest security to the algorithm which has been discussed through different examples. The original Hill cipher is obsolete in the present-day technology and serves as pedagogical purpose but whereas this newly proposed algorithm can be safely used in the present-day technology.\ Vulnerability from different types of attacks of the algorithm and the cardinality of key spaces have also been discussed.

Downloads

Download data is not yet available.

References

J. A. Gallian, Contemporary Abstract Algebra, 10th edition, Chapman and Hall/CRC, New York, 654 page (2021), DOI: 10.1201/9781003142331.

L. S. Hill, Cryptography in an algebraic alphabet, The American Mathematical Monthly 36(6) (1929), 306 – 312, DOI: 10.1080/00029890.1929.11986963.

I. A. Ismail, M. Amin and H. Diab, How to repair the Hill cipher, Journal of Zhejiang University – Science A 7 (2006), 2022 – 2030, DOI: 10.1631/jzus.2006.a2022.

C.-Q. Li, D. Zhang and G.-R. Chen, Cryptanalysis of an image encryption scheme based on the Hill cipher, Journal of Zhejiang University – Science A 9 (2007), 1118 – 1123, DOI: 10.1631/jzus.a0720102.

J. Overbey, W. Traves and J. Wojdylo, On the keyspace of the Hill cipher, Cryptologia 29(1) (2005), 59 – 72, DOI: 10.1080/0161-110591893771.

N. B. Parmar, Hill cipher modifications: A detailed review, International Journal of Innovative Research in Computer and Communication Engineering 3(3) (2015), 1467 – 1474.

S. Saeednia, How to make the Hill cipher secure, Cryptologia 24 (2000), 353 – 360, DOI: 10.1080/01611190008984253.

K. K. Sowmya and V. Srinivas, Applications of onto functions in cryptography, Mathematics and Statistics 12(2) (2024), 135 – 141, DOI: 10.13189/ms.2024.120203.

M. Toorani and A. Falahati, A secure variant of the Hill cipher, in: 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia, 2009, pp. 313 – 316, (2009), DOI: 10.1109/ISCC.2009.5202241.

M. H. Valizadeh, Healing the Hill cipher, improved approach to secure modified Hill against zero-plaintext attack, IACR Cryptologic ePrint Archive, 24 August 2016, 10 pages (2016), URL: https://iacr.org/news/item/7382.

B. Vasuki, L. Shobana and B. Roopa, Data encryption using face antimagic labeling and Hill cipher, Mathematics and Statistics 10(2) (2022), 431 – 435, DOI: 10.13189/ms.2022.100218.

Downloads

Published

31-12-2024
CITATION

How to Cite

Sowmya, K. K., & Srinivas, V. (2024). A Novel Asymmetric Encryption Technique Using Onto Functions. Communications in Mathematics and Applications, 15(5), 1481–1492. https://doi.org/10.26713/cma.v15i5.2844

Issue

Section

Research Article