Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

A New Cryptosystem Based on Three Knapsacks with Plaintext Encoding

View through CrossRef
In this paper, we propose a transformed knapsack cryptosystem by using three knapsacks with plaintext encoding to enhance the security of Knapsack cryptosystem. In our approach we try to encode a plaintext before encrypting. The benefits are that using plaintext encoding method can not only increase the density of the knapsack, but also reduce decrypt time substantially. The ciphertext is composed by multiplying two non-superincreasing knapsacks and then add to a superincreasing knapsack. Our propose scheme can be secure against the low density attack because the plaintext encoding the density can be made as large as our desire.
Title: A New Cryptosystem Based on Three Knapsacks with Plaintext Encoding
Description:
In this paper, we propose a transformed knapsack cryptosystem by using three knapsacks with plaintext encoding to enhance the security of Knapsack cryptosystem.
In our approach we try to encode a plaintext before encrypting.
The benefits are that using plaintext encoding method can not only increase the density of the knapsack, but also reduce decrypt time substantially.
The ciphertext is composed by multiplying two non-superincreasing knapsacks and then add to a superincreasing knapsack.
Our propose scheme can be secure against the low density attack because the plaintext encoding the density can be made as large as our desire.

Related Results

Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
Composite Discrete Logarithm Problem and a Reconstituted ElGamal Cryptosystem Based on the Problem
In this chapter, the authors have defined a new ElGamal cryptosystem by using the power Fibonacci sequence module m. Then they have defined a new sequence module m and the other El...
Transcriptomics extract the key chromium resistance genes of Cellulomonas
Transcriptomics extract the key chromium resistance genes of Cellulomonas
Abstract Cellulomonas fimi Clb-11 can reduce high toxic Cr (VI) to low toxic Cr (III). In this study, transcriptomics was used to analyze the key genes, which was involved ...
Modified Playfair cryptosystem for improved data security
Modified Playfair cryptosystem for improved data security
Playfair is the earliest known classical block cipher which is capable of taking two characters as a unit in the process of encryption and decryption. However, the cipher is suffer...
Secure PUF-Based Authentication Systems
Secure PUF-Based Authentication Systems
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address ...
Evaluating Binary Encoding Techniques in The Presence of Missing Values in Privacy-Preserving Record Linkage
Evaluating Binary Encoding Techniques in The Presence of Missing Values in Privacy-Preserving Record Linkage
IntroductionApplications in domains ranging from healthcare to national security increasingly require records about individuals in sensitive databases to be linked in privacy-prese...
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
<div> The most known of public key cryptosystem was introduced in 1978 by Rivest, Shamir and Adleman [19] and now called the RSA public key cryptosystem in their honor. Later...
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
On the High Dimensional RSA Algorithm—A Public Key Cryptosystem Based on Lattice and Algebraic Number Theory
<div> The most known of public key cryptosystem was introduced in 1978 by Rivest, Shamir and Adleman [19] and now called the RSA public key cryptosystem in their honor. Later...
A lightweight efficient chaos‐based cryptosystem for constrained‐node networks
A lightweight efficient chaos‐based cryptosystem for constrained‐node networks
SummaryInterconnected sensor and actuator objects creating Constrained‐Node Networks (CNN) are among the most prominent technologies of the Internet of things. Deployed to monitor ...

Back to Top