Professional Documents
Culture Documents
ISSN No:-2456-2165
Abstract:- Cryptography is a method of storing and computer scientists, for example, Hill (1929 and 1931) and
transmitting data in a particular form so that only those the references therein. Because governments do not wish
for whom it is intended can read and process the certain entities in and out of their countries to have access to
data.The ability to transmit messages in a way that ways to receive and send hidden information that may be a
cannot be recognized by adversaries has intrigued people threat to national interests, cryptography has been subject to
for centuries. In this paper, we outline a method that various restrictions in many countries, ranging from
uses Fermat's theorem to encode information in a way limitations of the usage and export of software to the public
that is very difficult to break. The idea is based on the dissemination of mathematical concepts that could be used
following consequence of that theorem. to develop cryptosystems.
Keywords:- Cryptography, Encryption, Plane text. However, the internet has allowed the spread of
powerful programs and, more importantly, the underlying
I. INTRODUCTION techniques of cryptography, so that many of the most
advanced cryptosystems and ideas are now in the public
Cryptography, the science of encryption, plays a domain.
central role in mobile phone communications, pay-tv, e-
commerce, sending private mails, transmitting financial Historically, the focus of cryptology has been on the
information, security of ATM cards, computer password, use of symmetric encryption to provide confidentiality. It is
etc. and touches on many aspect of our daily lives. only in the last several decades that other considerations,
Cryptography is the art and science encompassing the such as authentication, integrity, digital signatures, and the
principles and methods of transforming an intelligible use of public-key encryption, have been included in the
message (plane text) into one that is unintelligible (cipher theory and practice of cryptography or cryptology.
text) and then retransforming that message back to its
original form. Cryptography is a method of storing and transmitting
data in a particular form so that only those for whom it is
In this age of universal electronic connectivity of intended can read and process the data. The word
viruses and hackers of electronic eavesdropping and cryptography is derived from the Greek kryptos, meaning
electronic fraud, there is indeed a need to store the hidden. The origin of cryptographic system is dated back to
information securely. This, in turn, led to a heightened 2000 BC, (see Biggs (2008)) with the Egyptian practice of
awareness to protect data and resources from disclosure, to hieroglyphics. These consisted of complex pictograms, the
guarantee the authenticity of data and messages, and to full meaning of which was only known to an elite who were
protect systems from network-based attack, Stallings (2005). very few by then. Egyptian practice of hieroglyphics,
includes techniques such as microdots, merging words with
Cryptography is the science of transforming images, and other ways to hide information in storage or
communications so that only the intended recipient can transit.
understand them. Certain aspects of cryptography are indeed
quite mathematical in nature, though it is also used to The first known use of a modern cipher was by Julius
protect information in computing systems. It is closely Caesar (100 BC to 44 BC), Biggs (2008), who did not trust
related to the disciplines of cryptology and cryptanalysis. It his messengers when communicating with his governors and
is used everywhere and by billions of people worldwide on a officers. For this reason, he created a system in which each
daily basis, to protect data at rest and data in motion. character in his messages was replaced by a character three
positions ahead of it in the Roman alphabet.
Cryptographic systems are integral part of standard
protocols, most notably the Transport Layer Security (TLS) Lakshmi, et al. (2011) studied cryptography as a
protocol, making it relatively easy to incorporate strong methods of sending messages in disguised form so that only
encryption into a wide range of applications, Dan and Shou the intended recipients can remove the disguise and read the
(2015). However, in today's computer-centric world, massage. According to the authors with widespread
cryptography is most often associated with availability of computer technology, the rapid growth of
scrambling plaintext(ordinary text, sometimes referred to as wireless communications secured exchange of information
clear text) into cipher text. has become a challenging task. The most basic of the
modules in modern cryptography is that of a primitive,
In recent times, cryptography has turned into a which may be regarded as a cryptographic building block
battleground of some of the world's best mathematicians and which performs one or more desired functions, and may be
The elements of finite fields were used in binary and Two distinct prime 𝑝 and 𝑞 are chosen, each very large
polynomial form during encryption and decryption of the in practice. Then the words available for transmission (and
message. In the paper, they provided an algorithm that is punctuation symbols) are paired with distinct integers 𝑥 ≥
very difficult to alter. The sender and receiver shares the 22 The integers 𝑥 used may be assumed to be chosen
secret key 𝐾1, where 𝐾1 is (𝑛-1) × (𝑛-1) non-singular matrix relatively prime to 𝑝 and 𝑞, if these primes are large enough
and 𝑛 is a positive integer. The sender then converts the and, in practice, to be smaller than each of these primes. The
plaintext into pre-assigned numerical values and calculates idea is to use 𝑝 and𝑞 to compute an integer 𝑟 from 𝑥 and
𝑆1 = 𝐾1𝑃𝑚𝑜𝑑 (2𝑛-1); 𝑆1 is the first cipher text, 𝑃 is the plain then to transmit 𝑟 rather than 𝑥. Clearly, 𝑟 must be chosen
text. Then the sender converts 𝑆1 into binary string of 𝑛-bits in such a way that 𝑥 (and hence the corresponding word) can
which gives the matrix 𝑀 in their paper and choose a be retrieved from 𝑟. The passage from 𝑥 to 𝑟 (called
random matrix 𝐴 of order (𝑛-1) × (𝑛-1). The sender encoding) is carried out by sender of a message, the integer
performs 𝑋𝑁𝑂𝑅 operations with randomly selected 𝑟 is transmitted, and the computation of 𝑥 from 𝑟 (decoding)
rows/columns of 𝐴 with each row of matrix 𝑀 and gets a is done by the receiver.
matrix 𝑀𝑋𝑁𝑂𝑅. According to the authors the sender
converts the entries of 𝑀𝑋𝑁𝑂𝑅 into the elements of 𝐺𝐹(2𝑛) A. ALGORITHM
and multiply each entry with 𝑔𝑛 and calculates 𝐾2, whose Step 1: Given the distinct primes 𝑝and 𝑞, the cryptographer
entries is 1 if 𝑔 has the power greater than (2𝑛-1) otherwise denotes 𝑛 = 𝑝𝑞 and
0 and shares it with the receiver of the message. The 𝑚 = (𝑝 − 1)(𝑞 − 1)and chooses any integer 𝑘 ≥ 2 such
receiver then reduces the powers of the entries to 𝑚𝑜𝑑 that gcd(𝑘 𝑚) = 1.
(2𝑛−1) and gets the matrix 𝑀4. After writing it into binary Step 2: Only the numbers 𝑛 and 𝑘 are given, if the sender
form, the receiver converts the same in numerical values and wants to transmit an integer 𝑥, he or she encodes it by
then into text to get the final cipher text 𝑆2. This method of reducing 𝑥 𝑘 𝑚𝑜𝑑𝑢𝑙𝑜 𝑛, say 𝑥 𝑘 ≡ 𝑟(𝑚𝑜𝑑 𝑛)where 0 ≤ 𝑟 <
𝑛.
Note: If the receiver knows the inverse 𝐾 ′ of 𝑘 in ℤ𝑚 then In this paper, an application of cryptography using
𝐾 ′ 𝑘 = 1(𝑚𝑜𝑑 𝑚). Hence theorem 2 (with 𝑒 = 𝐾 ′ 𝑘) Fermat’s theorem is proposed. Note that all the sender really
′ ′ ′ has to know are 𝑛 𝑎𝑛𝑑 𝑘. A third party intercepting the
gives𝑥 𝐾 𝑘 ≡ 𝑥(𝑚𝑜𝑑 𝑛) and 𝑥 ≡ 𝑥 𝐾 𝑘 ≡ (𝑥 𝑘 )𝐾 =
′ message 𝑟cannot retrieve 𝑥without 𝐾 ′ , and computing it
𝑟 𝐾 modulo 𝑛. requires 𝑝 𝑎𝑛𝑑 𝑞. Even if the third party can extract the
integers 𝑛 𝑎𝑛𝑑 𝑘 from the sender, factoring 𝑛 = 𝑝𝑞 in
Example 1. Let 𝑝 = 11 and 𝑞 = 13 so that 𝑛 =
practice is time consuming if the primes 𝑝 𝑎𝑛𝑑 𝑞 are large.
143=143and 𝑚 = 120. Then let 𝑘 = 7, chosen so that
Hence the transformation is even more secured as it is very
gcd(𝑘, 𝑚) = 1. Encode the number 𝑥 = 9 and then decode
difficult to determine the various powers of 𝑟. Hence the
it.
code is extremely difficult to break.
Solution
REFERENCES
The sender reduces 𝑥 𝑘 = 97 (mod𝑛).
Thus;143: 92 ≡ 81, 93 ≡ 14, 94 ≡ 126, 95 ≡ 133, 96 ≡ [1.] Stallings, W (2005) Cryptography and network
53, 97 ≡ 48. Hence 𝑟 = 48 will be transmitted. The security, 4th edition prentice Hall.
receiver thenfinds 𝐾 ′ ; the inverse of 𝑘 = 7 (𝑚𝑜𝑑 𝑚). In fact [2.] Dan, B. and Victor, S. (2015), A Graduate Course in
by Euclidean algorithm one will get: 1 = 120 − 17(7), so Applied Cryptography, 7- 23.
𝐾 ′ ≡ −17 ≡ 103(𝑚𝑜𝑑 120) is the required inverse. Hence, [3.] Hill, L.S. (1929), Cryptography in an algebraic
′
𝑥is retrieved (mod 𝑛) by: 𝑥 = 𝑟 𝐾 ≡ 48103 (𝑚𝑜𝑑 143). alphabet, The American Mathematical Monthly, 36 (6)
306 – 312.
Note that 103≡ 1100111100111nary, and so 103 = [4.] Hill, L. S. (1931), Concerning certain linear
1 + 2 + 22 + 25 + 26 . Then the receiver compute 48𝑡 , transformation apparatus of cryptography, The Amer.
where 𝑡 is a power of 2 by successive squaring of 48 modulo Math. Monthly,38 (3) 135 – 154.
143. That is; [5.] Biggs, N. (2008), An introduction to information
2 3 4 5
482 ≡ 16, 482 ≡ 113, 482 ≡ 42, 482 ≡ 48, 482 ≡ communication and cryptography. Springer page 171.
6
16, 482 ≡ 113. Again working modulo 143 gives: 𝑥 ≡ [6.] Lakshmi, G. N.,Kumar, B. R.,Suneetha, C. and Sekhar,
2 5 6 A. C. (2011), A cryptographic scheme
48103 ≡ 481+2+2 +2 +2 = 48 . 16 . 113 . 16 .113 ≡ 9; [7.] of finite fields using logical operators, Intern. J.
which retrieves the original 9. Comput. Applic. 31 (4) 1 – 4.
Example 2. Let 𝑝 = 41 and 𝑞 = 43 so that 𝑛 = 1763763 [8.] Yakubu, D. G., Mathias, L. B., Lucy, B. G. and
LohcwatDomven. (2018) Extension of Affine Hill
and 𝑚 = 1680=1680n let 𝑘 = 23, chosen so that
cipher using rhotrices in the polyalphabetic cipher
gcd(𝑘, 𝑚) = 1. Encode the number 𝑥 = 11 and then decode
systems,Abacus J. Math. Asso. Niger. 45(1) 273-284.
it.
[9.] Sharma, P.L. and Rehan, M. (2013),On security of Hill
Solution cipher using finite fields, Inter. J.
The sender reduces 𝑥 𝑘 = 1123 (mod 𝑛). [10.] Compu. Applic. 71(4) 30 – 33.
Thus; 1763: 112 ≡ 121, 113 ≡ 1331,114 ≡ 537, 115 ≡ [11.] Introduction to Abstract Algebra, fourth edition by W.
618, 116 ≡ 1509, 117 ≡ 732, 118 ≡ 1000, 119 ≡ 422, Keith Nicholson, University of Calgary, Alberta
1110 ≡ 1116, 1111 ≡ 1698, 1112 ≡ 1048, 1113 ≡ 950, Canada.
1114 ≡ 1635, 1115 ≡ 355, 1116 ≡ 379, 1117 ≡ 643,
1118 ≡ 21, 1119 ≡ 231, 1120 ≡ 778, 1121 ≡ 1506,
1122 ≡ 699, 1123 ≡ 637 Hence 𝑟 = 637 will be
transmitted. The receiver then finds 𝐾 ′ ; the inverse of 𝑘 =
23 (𝑚𝑜𝑑 𝑚). In fact by Euclidean algorithm one will get:
1 = 1680 − 73(23)1680-73(23)𝐾 ′ ≡ −73 ≡
1607(𝑚𝑜𝑑 1763) is the required inverse. Hence, 𝑥is
′
retrieved (mod 𝑛) by: 𝑥 = 𝑟 𝐾 ≡ 6371607 (𝑚𝑜𝑑 1763).