A Novel Asymmetric Encryption Technique Using Onto Functions
DOI:
https://doi.org/10.26713/cma.v15i5.2844Keywords:
Onto function, Cryptography, Encryption, Decryption, Hill ciphers, MatricesAbstract
The concept of onto functions plays a very important role in the theory of Analysis and has got rich applications in many engineering and scientific techniques. In this paper, we are proposing a new application in the field of cryptography by using onto functions on the algebraic structures like rings like \((\mathbb{Z}_m,+_m,X_m)\) and fields like \((\mathbb{Z}_p,+_p,X_p)\) to get a strong encryption technique. A new asymmetric cryptographic system based on Hill ciphers is developed using onto functions with two keys- Primary and Secondary, to enhance the security. This is the first algorithm in cryptography developed using onto functions which ensures a strong security for the system while maintaining the simplicity of the existing Hill cipher. The concept of using two keys is also novel in the symmetric key cryptography. The usage of onto functions in the encryption technique eventually gives the highest security to the algorithm which has been discussed through different examples. The original Hill cipher is obsolete in the present-day technology and serves as pedagogical purpose but whereas this newly proposed algorithm can be safely used in the present-day technology.\ Vulnerability from different types of attacks of the algorithm and the cardinality of key spaces have also been discussed.
Downloads
References
J. A. Gallian, Contemporary Abstract Algebra, 10th edition, Chapman and Hall/CRC, New York, 654 page (2021), DOI: 10.1201/9781003142331.
L. S. Hill, Cryptography in an algebraic alphabet, The American Mathematical Monthly 36(6) (1929), 306 – 312, DOI: 10.1080/00029890.1929.11986963.
I. A. Ismail, M. Amin and H. Diab, How to repair the Hill cipher, Journal of Zhejiang University – Science A 7 (2006), 2022 – 2030, DOI: 10.1631/jzus.2006.a2022.
C.-Q. Li, D. Zhang and G.-R. Chen, Cryptanalysis of an image encryption scheme based on the Hill cipher, Journal of Zhejiang University – Science A 9 (2007), 1118 – 1123, DOI: 10.1631/jzus.a0720102.
J. Overbey, W. Traves and J. Wojdylo, On the keyspace of the Hill cipher, Cryptologia 29(1) (2005), 59 – 72, DOI: 10.1080/0161-110591893771.
N. B. Parmar, Hill cipher modifications: A detailed review, International Journal of Innovative Research in Computer and Communication Engineering 3(3) (2015), 1467 – 1474.
S. Saeednia, How to make the Hill cipher secure, Cryptologia 24 (2000), 353 – 360, DOI: 10.1080/01611190008984253.
K. K. Sowmya and V. Srinivas, Applications of onto functions in cryptography, Mathematics and Statistics 12(2) (2024), 135 – 141, DOI: 10.13189/ms.2024.120203.
M. Toorani and A. Falahati, A secure variant of the Hill cipher, in: 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia, 2009, pp. 313 – 316, (2009), DOI: 10.1109/ISCC.2009.5202241.
M. H. Valizadeh, Healing the Hill cipher, improved approach to secure modified Hill against zero-plaintext attack, IACR Cryptologic ePrint Archive, 24 August 2016, 10 pages (2016), URL: https://iacr.org/news/item/7382.
B. Vasuki, L. Shobana and B. Roopa, Data encryption using face antimagic labeling and Hill cipher, Mathematics and Statistics 10(2) (2022), 431 – 435, DOI: 10.13189/ms.2022.100218.
Downloads
Published
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a CCAL that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.