CFP last date
20 December 2024
Call for Paper
January Edition
IJCA solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 20 December 2024

Submit your paper
Know more
Reseach Article

Two Level Encryption based on One Time Pad and Koblitz Method of Encoding

by Jayashree Katti, Santoshi Pote, B. K. Lande
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 15
Year of Publication: 2015
Authors: Jayashree Katti, Santoshi Pote, B. K. Lande
10.5120/21773-5041

Jayashree Katti, Santoshi Pote, B. K. Lande . Two Level Encryption based on One Time Pad and Koblitz Method of Encoding. International Journal of Computer Applications. 122, 15 ( July 2015), 1-5. DOI=10.5120/21773-5041

@article{ 10.5120/21773-5041,
author = { Jayashree Katti, Santoshi Pote, B. K. Lande },
title = { Two Level Encryption based on One Time Pad and Koblitz Method of Encoding },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 15 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-5 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number15/21773-5041/ },
doi = { 10.5120/21773-5041 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:10:35.827180+05:30
%A Jayashree Katti
%A Santoshi Pote
%A B. K. Lande
%T Two Level Encryption based on One Time Pad and Koblitz Method of Encoding
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 15
%P 1-5
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of technology, traditional encryption techniques are facing challenges in key distribution and protection. This paper proposes a novel method of encryption using one time pad and elliptic curve cryptography. Given plain text will be encrypted using one time pad. The resulting cipher text will be encoded using Koblitz method of encoding. This paper describes Koblitz's method to represent a message to a point and point to message. It is already well known that one time pad is unbreakable cipher and is used when highest form of security is desired. The problem of key distribution and protection will be solved using elliptic curve cryptography.

References
  1. Nithin Nagaraj, "Short communicationOne-Time Pad as a nonlinear dynamical system"Amrita Vishwa Vidyapeetham, Amritapuri Campus, India,Elsevier, http://dx. doi. org/10. 1016/j. cnsns. 2012. 03. 020
  2. Shannon CE. Communication theory of secrecysystems. Bell Syst Tech J 1949;28:656–715
  3. Shannon CE. A mathematicaltheory of communication. Bell Syst Tech J 1948; 27:379–423
  4. Tarun Narayan Shankar, G. Sahoo, "Cryptography with Elliptic Curves", International Journal Of Computer Science And Applications Vol. 2, No. 1, April / May 2009,ISSN: 0974-1003
  5. Menezes A, van Oorschot PC, Vanstone S. Handbook of applied cryptography. Boca Raton, FL: CRC Press; 1996
  6. Nithin Nagaraj and Vivek Vaidya "Re-visiting the One-Time Pad", International Journal of Network Security, Vol. 6, No. 1, PP. 94–102, Jan. 2008
  7. Kimmo Jarvinen and Jorma Skytta, "Fast point multiplication on Komblitz curves: Parallelization method and implementations", Elsevier, Microprocessors and Microsystems, Volume 33, Issue 2, March 2009, Pages 106-116, doi:10. 1016/j. micpro. 2008. 08. 002
  8. Shukla, R. and Prakash, H. O. , "Sampurna Suraksha: Unconditionally Secure and Authenticated One Time Pad Cryptosystem", IEEE Conference: International Conference on Machine Intelligence and Research Advancement , 2013 ,Pages: 174 - 178, DOI: 10. 1109/ICMIRA. 2013. 40
  9. Borowski, M. , Lesniewicz, M. ,"Modern usage of old one-time pad", IEEE Conference :Communications and Information Systems 2012,Pages: 1 – 5, ISBN: 978-1-4673-1422-0.
  10. Songsheng Tang and Fuqiang Liu,"A one time pad encryption algorithm based on one-way hash and conventional block cipher", IEEE Conference: 2nd International Conference on Consumer Electronics, Communications and Networks , 2012 Pages: 72 - 74, DOI: 10. 1109/CECNet. 2012. 6201917
  11. Boruah, D. ; Saikia, M. , "Implementation of ElGamal Elliptic Curve Cryptography over prime field using C", IEEE Conference: International Conference on Information Communication and Embedded Systems , 2014, Pages: 1 - 7, DOI: 10. 1109/ICICES. 2014. 7033751
Index Terms

Computer Science
Information Sciences

Keywords

One Time Pad Elliptic curve cryptography Koblitz method