Data Encryption Technique Using Random Number Generator

The coding theory is an application of algebra that has become increasingly important over the decades. There are some different works that have been devoted to the problems of cryptography/cryptology. Cryptography is the study of sending and receiving secret messages. With the widespread use of information technologies and the rise of digital computer networks in many areas of the world, securing the exchange of information has become a crucial task. Currently, very active research is being done with electronic or communication applications. In the present paper an innovative technique for data encryption is proposed based on the random sequence generation using the recurrence matrices and a quadruple vector. The new algorithm provides data encryption at two levels and hence security against crypto analysis is achieved at relatively low computational overhead.

[1]  I. Turksen Interval valued fuzzy sets based on normal forms , 1986 .

[2]  Jerry M. Mendel,et al.  Interval type-2 fuzzy logic systems , 2000, Ninth IEEE International Conference on Fuzzy Systems. FUZZ- IEEE 2000 (Cat. No.00CH37063).

[3]  M. Braine On the Relation Between the Natural Logic of Reasoning and Standard Logic. , 1978 .

[4]  Alexey Stakhov,et al.  The golden section in the measurement theory , 1989 .

[5]  Janusz Kacprzyk,et al.  LINGUISTIC SUMMARIES OF DATA USING FUZZY LOGIC , 2001 .

[6]  Lotfi A. Zadeh,et al.  Outline of a New Approach to the Analysis of Complex Systems and Decision Processes , 1973, IEEE Trans. Syst. Man Cybern..

[7]  Tzong-Mou Wu One-to-one mapping matrix , 2005, Appl. Math. Comput..

[8]  Jerry M. Mendel,et al.  Interval Type-2 Fuzzy Logic Systems Made Simple , 2006, IEEE Transactions on Fuzzy Systems.

[9]  Jerry M. Mendel The perceptual computer: an architecture for computing with words , 2001, 10th IEEE International Conference on Fuzzy Systems. (Cat. No.01CH37297).

[10]  Masoud Nikravesh Soft computing for reservoir characterization and management , 2005, 2005 IEEE International Conference on Granular Computing.

[11]  Jerry M. Mendel,et al.  Type-2 fuzzy sets and systems: an overview , 2007, IEEE Computational Intelligence Magazine.

[12]  C. E. SHANNON,et al.  A mathematical theory of communication , 1948, MOCO.

[13]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[14]  Lotfi A. Zadeh,et al.  Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..

[15]  Didier Dubois,et al.  Probability-Possibility Transformations, Triangular Fuzzy Sets, and Probabilistic Inequalities , 2004, Reliab. Comput..

[16]  Alexey Stakhov,et al.  The Golden Section and Modern Harmony Mathematics , 1998 .

[17]  A. Vinaya Babu,et al.  A generalized scheme for data encryption technique using a randomized matrix key , 2007 .

[18]  Jerry M. Mendel,et al.  Computing with words and its relationships with fuzzistics , 2007, Inf. Sci..

[19]  Alexey Stakhov,et al.  The “golden” matrices and a new kind of cryptography , 2007 .

[20]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[21]  Aaron D. Wyner,et al.  Communication Theory of Secrecy SystemsThe material in this paper appeared originally in a confidential report ¿A Mathematical Theory of Cryptography¿ dated Sept. 1, 1945, which has now been declassified. , 1993 .

[22]  I. Turksen Type 2 representation and reasoning for CWW , 2002 .

[23]  Jerry M. Mendel,et al.  Aggregation Using the Linguistic Weighted Average and Interval Type-2 Fuzzy Sets , 2007, IEEE Transactions on Fuzzy Systems.

[24]  Nick Chater,et al.  Fast, frugal, and rational: How rational norms explain behavior , 2003 .

[25]  Lotfi A. Zadeh,et al.  Toward a generalized theory of uncertainty (GTU)--an outline , 2005, Inf. Sci..