# Cite Article

### A New Method of Data Encryption based on One to One Functions

Choose citation format## BibTeX

@article{IJASEIT10765, author = {Osama R Shahin and Anis Ben Aissa and Yasser Fouad and Hassan Al-Mahdi and Mansi Alsmarah}, title = {A New Method of Data Encryption based on One to One Functions}, journal = {International Journal on Advanced Science, Engineering and Information Technology}, volume = {10}, number = {3}, year = {2020}, pages = {1169--1175}, keywords = {cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.}, abstract = {Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (

}, issn = {2088-5334}, publisher = {INSIGHT - Indonesian Society for Knowledge and Human Development}, url = {http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765}, doi = {10.18517/ijaseit.10.3.10765} }K, a, b) represent the private keys. To speed up the proposed OtO computation, the value ofKis calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private keyKonly knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA.Â

## EndNote

%A Shahin, Osama R %A Aissa, Anis Ben %A Fouad, Yasser %A Al-Mahdi, Hassan %A Alsmarah, Mansi %D 2020 %T A New Method of Data Encryption based on One to One Functions %B 2020 %9 cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function. %! A New Method of Data Encryption based on One to One Functions %K cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function. %XDue to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (

%U http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765 %R doi:10.18517/ijaseit.10.3.10765 %J International Journal on Advanced Science, Engineering and Information Technology %V 10 %N 3 %@ 2088-5334K, a, b) represent the private keys. To speed up the proposed OtO computation, the value ofKis calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private keyKonly knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA.Â

## IEEE

Osama R Shahin,Anis Ben Aissa,Yasser Fouad,Hassan Al-Mahdi and Mansi Alsmarah,"A New Method of Data Encryption based on One to One Functions,"International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 3, pp. 1169-1175, 2020. [Online]. Available: http://dx.doi.org/10.18517/ijaseit.10.3.10765.

## RefMan/ProCite (RIS)

TY - JOUR AU - Shahin, Osama R AU - Aissa, Anis Ben AU - Fouad, Yasser AU - Al-Mahdi, Hassan AU - Alsmarah, Mansi PY - 2020 TI - A New Method of Data Encryption based on One to One Functions JF - International Journal on Advanced Science, Engineering and Information Technology; Vol. 10 (2020) No. 3 Y2 - 2020 SP - 1169 EP - 1175 SN - 2088-5334 PB - INSIGHT - Indonesian Society for Knowledge and Human Development KW - cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function. N2 -Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (

UR - http://ijaseit.insightsociety.org/index.php?option=com_content&view=article&id=9&Itemid=1&article_id=10765 DO - 10.18517/ijaseit.10.3.10765K, a, b) represent the private keys. To speed up the proposed OtO computation, the value ofKis calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private keyKonly knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA.Â

## RefWorks

RT Journal Article ID 10765 A1 Shahin, Osama R A1 Aissa, Anis Ben A1 Fouad, Yasser A1 Al-Mahdi, Hassan A1 Alsmarah, Mansi T1 A New Method of Data Encryption based on One to One Functions JF International Journal on Advanced Science, Engineering and Information Technology VO 10 IS 3 YR 2020 SP 1169 OP 1175 SN 2088-5334 PB INSIGHT - Indonesian Society for Knowledge and Human Development K1 cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function. ABK, a, b) represent the private keys. To speed up the proposed OtO computation, the value ofKis calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private keyKonly knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA.Â