Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

New Encryption Using Braille Codes and Elliptic Curves

View through CrossRef
This work focuses on secure communication for visually impaired individuals by integrating Braille encoding with elliptic curve cryptography. We propose a novel encryption algorithm that leverages elliptic curves defined over the ring A3 = F2d [X] (X3) as described in, [1]. The algorithm introduces a matrix-based encoding scheme that utilizes points on the elliptic curve Ea,b(A3) to encode information. It combines a password with a symmetric key to enhance security, exploiting the algebraic structure of these matrices. We illustrate the method with a concrete example of an encrypted message and provide a security analysis. The core security challenge addressed is the difficulty of recovering the password and private sub-key, which depends on the computational hardness of identifying the corresponding elliptic curve points. This methodology can be applied in conjunction with Computational Intelligence (CI) techniques, such as neural networks, fuzzy logic, and genetic algorithms.
Title: New Encryption Using Braille Codes and Elliptic Curves
Description:
This work focuses on secure communication for visually impaired individuals by integrating Braille encoding with elliptic curve cryptography.
We propose a novel encryption algorithm that leverages elliptic curves defined over the ring A3 = F2d [X] (X3) as described in, [1].
The algorithm introduces a matrix-based encoding scheme that utilizes points on the elliptic curve Ea,b(A3) to encode information.
It combines a password with a symmetric key to enhance security, exploiting the algebraic structure of these matrices.
We illustrate the method with a concrete example of an encrypted message and provide a security analysis.
The core security challenge addressed is the difficulty of recovering the password and private sub-key, which depends on the computational hardness of identifying the corresponding elliptic curve points.
This methodology can be applied in conjunction with Computational Intelligence (CI) techniques, such as neural networks, fuzzy logic, and genetic algorithms.

Related Results

Braille Reader Using Cellular Phone with Embedded Camera
Braille Reader Using Cellular Phone with Embedded Camera
Braille, recently, has come to be written for the instructions of the elevators and the public place for blind people. However, only about 10% of people who are blind can read Brai...
MUSHAF AL-QUR'AN BRAILLE PASCA-STANDARDISASI
MUSHAF AL-QUR'AN BRAILLE PASCA-STANDARDISASI
Tulisan ini mengkaji sejarah perkembangan mushaf Al-Qur'an braille di Indonesia setelah distandarkan dan dikukuhkan sebagai Mushaf Standar Braille melalui Keputusan Menteri Agama (...
Large families of elliptic curves ordered by conductor
Large families of elliptic curves ordered by conductor
In this paper we study the family of elliptic curves $E/{{\mathbb {Q}}}$, having good reduction at $2$ and $3$, and whose $j$-invariants are small. Within this set of elliptic curv...
RASM USMANI DALAM PENULISAN AL-QUR’AN BRAILLE
RASM USMANI DALAM PENULISAN AL-QUR’AN BRAILLE
Tulisan ini menyajikan kajian tentang upaya penulisan Al-Qur’an Braille di Indonesia yang dilakukan dengan menggunakan rasm usmani di tengah kecenderungan penulisan Al-Qur’an B...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...

Back to Top