CFP last date
20 January 2025
Reseach Article

Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding

by R. Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 55 - Number 1
Year of Publication: 2012
Authors: R. Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani
10.5120/8721-2593

R. Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani . Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding. International Journal of Computer Applications. 55, 1 ( October 2012), 32-35. DOI=10.5120/8721-2593

@article{ 10.5120/8721-2593,
author = { R. Siva Ranjani, D. Lalitha Bhaskari, P. S. Avadhani },
title = { Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding },
journal = { International Journal of Computer Applications },
issue_date = { October 2012 },
volume = { 55 },
number = { 1 },
month = { October },
year = { 2012 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume55/number1/8721-2593/ },
doi = { 10.5120/8721-2593 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:56:10.915181+05:30
%A R. Siva Ranjani
%A D. Lalitha Bhaskari
%A P. S. Avadhani
%T Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding
%J International Journal of Computer Applications
%@ 0975-8887
%V 55
%N 1
%P 32-35
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, an algorithm for secure transmission of message is proposed based on Lagrange's interpolation. The message is viewed as a polynomial of degree n where n is kept secret and transmitted to the receiver's side using the concept of a digital envelope. As any nth degree polynomial is uniquely determined by n+1 points, n +1 points are communicated to the other side, where the polynomial and hence the message is reconstructed. Padding of length m is added to the message to overcome the message length issue. Although any coding scheme may be used, in this paper Huffman coding is used for converting the plaintext into binary form. Finally, the proposed algorithm is compared with the performance of RSA algorithm and found to be efficient.

References
  1. Th. Sauer and Y. Xu. On multivariate Lagrange interpolation. Mathematics of computation Volume 64, pages 1147-1170, jul 1995.
  2. R. L. Rivest, A. Shamir, L. Adleman "A method for obtaining digital signatures and Public-Key Cryptosystems", Communications of the ACM Volume 21,pp:120-126, 1978.
  3. A. Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, pp. 84-89, 2006.
  4. Hwang, R. J. , Su, F. F. , Yeh, Y. S. and Chen, C. Y. 2005. An Efficient Decryption Method for RSA Cryptosystem. AINA'05 Pp:585- 590, 2005.
  5. Davis, T. RSA Encryption [Online]. Available from World Wide Web: http://www. geometer. org /mathcircles, March 2006.
  6. D. A. Huffman, "A Method for the Construction of Minimum-Redundancy Codes", Proceedings of the I. R. E. , pp 1098–1102, September 1952.
  7. Press, WH; Teukolsky, SA; Vetterling, WT; Flannery, BP "Chapter 7. Random Numbers". Numerical Recipes: The Art of Scientific Computing (3rd ed. ). New York: Cambridge University Press. ISBN 978-0-521-88068-8, 2007.
  8. R. Lidl and H. Niederreiter, Finite fields, 2nd edition, Cambridge University Press, Cambridge, 1997.
  9. Chia-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang , "Computational Complexity Analyses of Modular Arithmetic for RSA Cryptosystem",23rd Workshop on Combinatorial Mathematics and Computation Theory (CMCT'06) , Taichung, Taiwan, pp. 215-224, April 28-29, 2006.
  10. Saurabh Singh, Gaurav Agarwal, "Use of Chinese Remainder Theorem to generate random numbers for cryptography",IJAER, pp. 168-174 Nov 2010.
  11. Eugéne C. Ezin,"Modeling Data transmission through a Channel Based on Huffman coding and Encryption methods", IJCSIS, Vol 8, pp:195-199, No. 9 December 2010.
  12. Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings, International Journal of Network Security, Vol. 14, No. 3, PP. 142:148, May 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Lagrange interpolation Hamming code Padding polynomial digital envelope RSA