We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Elliptic Curves, Palindrome Numbers and Secret keys

by Karuna Kamath K, Shankar B.r
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 44 - Number 9
Year of Publication: 2012
Authors: Karuna Kamath K, Shankar B.r
10.5120/6288-8477

Karuna Kamath K, Shankar B.r . Elliptic Curves, Palindrome Numbers and Secret keys. International Journal of Computer Applications. 44, 9 ( April 2012), 1-4. DOI=10.5120/6288-8477

@article{ 10.5120/6288-8477,
author = { Karuna Kamath K, Shankar B.r },
title = { Elliptic Curves, Palindrome Numbers and Secret keys },
journal = { International Journal of Computer Applications },
issue_date = { April 2012 },
volume = { 44 },
number = { 9 },
month = { April },
year = { 2012 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume44/number9/6288-8477/ },
doi = { 10.5120/6288-8477 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:35:03.979161+05:30
%A Karuna Kamath K
%A Shankar B.r
%T Elliptic Curves, Palindrome Numbers and Secret keys
%J International Journal of Computer Applications
%@ 0975-8887
%V 44
%N 9
%P 1-4
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A secret key generation scheme based on points on Elliptic curves and palindromes is presented in this paper. These keys could be used as One Time Pads for secure transaction. Our method generates keys of variable size randomly. The procedure can be easily deployed in security –sensitive systems to reduce the damage caused by hacking the data.

References
  1. Neal Koblitz, " A Course in Number Theory and Cryptography" Springer- verlag , Second Edition ,1994.
  2. William Stallings, "Cryptography and Network Security: Principles and Practices", PHI, 2005, Fourth Edition.
  3. 196 Palindrome Quest, Most Delayed Palindromic Number: http://www. jasondoucette. com/worldrecords. html
  4. John Walker, "Three Years of Computing Final Report on the Palindrome Quest", http://www. fourmilab. ch/documents/threeyears/threeyears. html
  5. Steganography and Steganalysis J. R. Krenn January 2004 http://www. krenn. nl/univ/cry/steg/article. pdf
  6. http://iwearshorts. com/Mike/uploads/2011/06/10. 1. 1. 62. 8194. pdf
  7. Hide and Seek: An Introduction to Steganography, NIELS PROVOS AND PETER HONEYMAN University of Michigan.
  8. Improved Detection of LSB Steganography in Grayscale Images by Andrew D. Ker http://www. cs. ox. ac. uk/andrew. ker/docs/ADK09D. pdf
  9. T Morkel, JHP Eloff and MS Olivier, "An Overview of Image Steganography," in Proceedings of the Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, June/July 2005.
  10. Reliable Detection of LSB Steganography in Color and Grayscale Images by Jessica Fridrich http://faculty. ksu. edu. sa/ghazy/Steg/References/ref26-2. pdf
  11. Shankar B R, Karuna Kamath K, "(2,1) Lagged Fibonacci Generators Using Elliptic Curves over Finite Fields", Proceedings of International Conference on Computer Engineering and Technology, Vol 2, pp 456-457, 22-24 Jan 2009, Singapore.
  12. Cole, E. , Hiding in Plain Sight: "Steganography and the Art of Covert Communication", Canada: 2003 Wiliey Publishing.
Index Terms

Computer Science
Information Sciences

Keywords

Palindromes Elliptic Curve Fibonacci Sequence Stream Cipher Random Number