An Approach to Encryption Using Superior Fractal Sets

Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 150)

Abstract

The voluminous digital data exchange between various computers has introduced large amount of security vulnerabilities. Encryption schemes have been increasingly studied to meet the demand for real-time secure transmission of data over the Internet and through wireless networks. In this paper, we try to study a new cryptographic key exchange protocol based on superior Mandelbrot and Superior Julia sets. In this study we analyze a cryptographic system utilizing fractal theories; this approach uses concept of public key cryptography by taking advantage of the connection of Superior Julia and Superior Mandelbrot sets. This paper exploits the main feature of public key security.

Keywords

Superior Mandelbrot and Julia sets Fractal geometry Public key 

References

  1. 1.
    Menzes A, Oorschot PV, Vanstone S (1996) Handbook of applied cryptography. CRC Press, Boca Raton, pp 425–488Google Scholar
  2. 2.
    Ms A (2007) Public key cryptography: applications algorithms and mathematical explanations. Tata Elxsi, IndiaGoogle Scholar
  3. 3.
    Preneel B, Mercierlaan K (2004) Cryptanalysis of message authentication codes. Department Electrical Engineering, Katholieke Universiteit Leuven, BelgiumGoogle Scholar
  4. 4.
    Damgard A (1989) Design principle for hash functions. In: Brassard G (ed) Advances in cryptology-crypto 89 proceedings. Lecture notes in computer science, vol 435. Springer-Verlag, BerlinGoogle Scholar
  5. 5.
    Yang F (2005) Cryptanalysis on an algorithm for efficient digital signatures. In: Cryptology ePrint archive 2005/456Google Scholar
  6. 6.
    Dobbertin H (1996) The Status of MD5 after a recent attack. In: RSA Labs’ CryptoBytes, vol 2(2), SummerGoogle Scholar
  7. 7.
    El-Bolok H, El-Mageed TA, El-Salam NA, Elgtawal IA (2003) Public key cryptosystems and its applications in digital signature. Helwan University, Faculty of EngineeringGoogle Scholar
  8. 8.
    Dugelay JL, Polidori E, Roche S (1996) Iterated function systems for still image processing. In: IWISP-96, Manchester, UK, 2005Google Scholar
  9. 9.
    Barnsley M (1993) Fractals everywhere, 2nd edn. Academic Press Professional Inc., San Diego, ISBN: 10: 0120790610, pp 550Google Scholar
  10. 10.
    Barnsley M, Demko S (1985) Iterated function systems and the global construction of fractals. Proc R Soc Lond 399:243–275. http://adsabs.harvard.edu/abs/1985RSPSA.399..243B
  11. 11.
    Rani M (2002) Iterative procedures in fractals and chaos. Ph D thesis, Department of computer science, Faculty of technology, Gurukula Kangri Vishvavidyalaya, HardwarGoogle Scholar
  12. 12.
    Rani M, Kumar V (2004) Superior Mandelbrot set. J Koreans Soc Math Educ Ser D 8(4):279–291Google Scholar
  13. 13.
    Koblitz N (1994) A course in number theory and cryptography, 2nd edn. Springer, Berlin, ISBN: 0387942939, p 235Google Scholar
  14. 14.
    Goldreich O, Goldwasser S, Micali S (1986) How to construct random functions. J ACM 33(4):210–217Google Scholar
  15. 15.
    Atkinson R (1995) Security architecture for the internet protocol. IETF Network Working Group, RFC 1825Google Scholar
  16. 16.
    Atkinson R (1995) IP authentication header. IETF Network Working Group, RFC 1826Google Scholar
  17. 17.
    Rivest R, Shamir A, Adleman L (1978) A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun ACM 21(2):120–126MathSciNetMATHCrossRefGoogle Scholar
  18. 18.
    ElGamal T (1985) A public key cryptosystem and a signature scheme based on discrete logarithms. In: IEEE Trans Inf Theory IT 31(4):469–472Google Scholar
  19. 19.
    Diffie W, Hellman M (1976) New directions in cryptography. In: IEEE Trans Inf Theory It-22(6):644–654Google Scholar
  20. 20.
    Stalling W (2004) Cryptography and network security. PHI, New DelhiGoogle Scholar
  21. 21.
    Hou YC, Tu SF (2005) A visual cryptographic technique for chromatic images using multi-pixel encoding method. J Res Pract Inf Technol 37(2):179–192Google Scholar
  22. 22.
    Fisher Y (1995) Fractal image compression: theory and application. Springer-Verlag, New York, ISBN: 0-387-94211-4, pp 341Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  1. 1.Computer Science DepartmentNIMS UniversityJaipurIndia
  2. 2.Sri Ram Murti Smarak International Business SchoolLucknowIndia

Personalised recommendations