Cite Article

A New Method of Data Encryption based on One to One Functions

Choose citation format

BibTeX

@article{IJASEIT10765,
   author = {Osama R Shahin and Anis Ben Aissa and Yasser Fouad and Hassan Al-Mahdi and Mansi Alsmarah},
   title = {A New Method of Data Encryption based on One to One Functions},
   journal = {International Journal on Advanced Science, Engineering and Information Technology},
   volume = {10},
   number = {3},
   year = {2020},
   pages = {1169--1175},
   keywords = {cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.},
   abstract = {

Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (K, a, b) represent the private keys. To speed up the proposed OtO computation, the value of K is calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private key K only knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA. 

},    issn = {2088-5334},    publisher = {INSIGHT - Indonesian Society for Knowledge and Human Development},    url = {http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765},    doi = {10.18517/ijaseit.10.3.10765} }

EndNote

%A Shahin, Osama R
%A Aissa, Anis Ben
%A Fouad, Yasser
%A Al-Mahdi, Hassan
%A Alsmarah, Mansi
%D 2020
%T A New Method of Data Encryption based on One to One Functions
%B 2020
%9 cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.
%! A New Method of Data Encryption based on One to One Functions
%K cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.
%X 

Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (K, a, b) represent the private keys. To speed up the proposed OtO computation, the value of K is calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private key K only knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA. 

%U http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765 %R doi:10.18517/ijaseit.10.3.10765 %J International Journal on Advanced Science, Engineering and Information Technology %V 10 %N 3 %@ 2088-5334

IEEE

Osama R Shahin,Anis Ben Aissa,Yasser Fouad,Hassan Al-Mahdi and Mansi Alsmarah,"A New Method of Data Encryption based on One to One Functions," International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 3, pp. 1169-1175, 2020. [Online]. Available: http://dx.doi.org/10.18517/ijaseit.10.3.10765.

RefMan/ProCite (RIS)

TY  - JOUR
AU  - Shahin, Osama R
AU  - Aissa, Anis Ben
AU  - Fouad, Yasser
AU  - Al-Mahdi, Hassan
AU  - Alsmarah, Mansi
PY  - 2020
TI  - A New Method of Data Encryption based on One to One Functions
JF  - International Journal on Advanced Science, Engineering and Information Technology; Vol. 10 (2020) No. 3
Y2  - 2020
SP  - 1169
EP  - 1175
SN  - 2088-5334
PB  - INSIGHT - Indonesian Society for Knowledge and Human Development
KW  - cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.
N2  - 

Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (K, a, b) represent the private keys. To speed up the proposed OtO computation, the value of K is calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private key K only knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA. 

UR - http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765 DO - 10.18517/ijaseit.10.3.10765

RefWorks

RT Journal Article
ID 10765
A1 Shahin, Osama R
A1 Aissa, Anis Ben
A1 Fouad, Yasser
A1 Al-Mahdi, Hassan
A1 Alsmarah, Mansi
T1 A New Method of Data Encryption based on One to One Functions
JF International Journal on Advanced Science, Engineering and Information Technology
VO 10
IS 3
YR 2020
SP 1169
OP 1175
SN 2088-5334
PB INSIGHT - Indonesian Society for Knowledge and Human Development
K1 cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.
AB 

Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (K, a, b) represent the private keys. To speed up the proposed OtO computation, the value of K is calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private key K only knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA. 

LK http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765 DO - 10.18517/ijaseit.10.3.10765