TY - GEN
T1 - New data encryption algorithm and its implementation for online user authorization
AU - Luma, A.
AU - Raufi, B.
PY - 2009
Y1 - 2009
N2 - Most of the encryption algorithms used today generate huge cipher messages as well as long encryption keys. These approaches require time and are computationally intensive. In this paper we introduce two operators represented as mathematical models called Pentor and Ultra Pentor. These operators can be easily generated out of any number and can be used for encryption purposes. The strength of the cryptosystem proposed here lies in the irreversible property that these two operators have during authorization process. Once the operators have been generated, it is extremely burdensome to find the numbers out of which these operators have been generated. This irreversible property has been used for creation of online authorization scheme that uses a genuine three step encryption algorithm. The strength of the proposed cryptosystem disserts the possible applications in online authorization systems.
AB - Most of the encryption algorithms used today generate huge cipher messages as well as long encryption keys. These approaches require time and are computationally intensive. In this paper we introduce two operators represented as mathematical models called Pentor and Ultra Pentor. These operators can be easily generated out of any number and can be used for encryption purposes. The strength of the cryptosystem proposed here lies in the irreversible property that these two operators have during authorization process. Once the operators have been generated, it is extremely burdensome to find the numbers out of which these operators have been generated. This irreversible property has been used for creation of online authorization scheme that uses a genuine three step encryption algorithm. The strength of the proposed cryptosystem disserts the possible applications in online authorization systems.
UR - https://www.scopus.com/pages/publications/84896832465
M3 - Conference contribution
AN - SCOPUS:84896832465
SN - 9789532330465
T3 - MIPRO 2009 - 32nd International Convention Proceedings: Digital Economy - 6th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers
SP - 141
EP - 144
BT - MIPRO 2009 - 32nd International Convention Proceedings
T2 - 32nd International Convention Proceedings: Digital Economy - 6th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers
Y2 - 25 May 2009 through 29 May 2009
ER -