New data encryption algorithm and its implementation for online user authorization

A. Luma, B. Raufi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Most of the encryption algorithms used today generate huge cipher messages as well as long encryption keys. These approaches require time and are computationally intensive. In this paper we introduce two operators represented as mathematical models called Pentor and Ultra Pentor. These operators can be easily generated out of any number and can be used for encryption purposes. The strength of the cryptosystem proposed here lies in the irreversible property that these two operators have during authorization process. Once the operators have been generated, it is extremely burdensome to find the numbers out of which these operators have been generated. This irreversible property has been used for creation of online authorization scheme that uses a genuine three step encryption algorithm. The strength of the proposed cryptosystem disserts the possible applications in online authorization systems.

Original languageEnglish
Title of host publicationMIPRO 2009 - 32nd International Convention Proceedings
Subtitle of host publicationDigital Economy - 6th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers
Pages141-144
Number of pages4
Publication statusPublished - 2009
Externally publishedYes
Event32nd International Convention Proceedings: Digital Economy - 6th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers - Opatija, Croatia
Duration: 25 May 200929 May 2009

Publication series

NameMIPRO 2009 - 32nd International Convention Proceedings: Digital Economy - 6th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers
Volume5

Conference

Conference32nd International Convention Proceedings: Digital Economy - 6th ALADIN, Information Systems Security, Business Intelligence Systems, Local Government and Student Papers
Country/TerritoryCroatia
CityOpatija
Period25/05/0929/05/09

Fingerprint

Dive into the research topics of 'New data encryption algorithm and its implementation for online user authorization'. Together they form a unique fingerprint.

Cite this