An encoding schematic based on coordinate transformations

Full Text (PDF, 229KB), PP.9-14

Views: 0 Downloads: 0

Author(s)

Awnon Bhowmik 1,*

1. Department of Mathematics, The City College of New York, 160 Convent Ave, New York, NY 10031, USA

* Corresponding author.

DOI: https://doi.org/10.5815/ijmsc.2020.06.02

Received: 9 Sep. 2020 / Revised: 14 Oct. 2020 / Accepted: 13 Nov. 2020 / Published: 8 Dec. 2020

Index Terms

change of axes, rotation of axes, rotation matrix, vector geometry, threshold cryptography, Koblitz encoding, cantor pairing function, 4-tuple parameter

Abstract

This paper outlines an encoding schematic that is dependent on simple Cartesian coordinate transformations. Namely, the change of axes and the rotation of axes. A combination of these two is incorporated after turning singular ASCII values into 2D points. This system is based on multiple private keys that can also act as a potential candidate for threshold cryptography. Comprehensive initial testing has been performed on certain parameters by altering their values within a range. Further testing is required for more insights about the system. For now, the list of parameters that amounts to successful decryption is to be noted down for future use with this system.

Cite This Paper

Awnon Bhowmik. " An encoding schematic based on coordinate transformations ", International Journal of Mathematical Sciences and Computing (IJMSC), Vol.6, No.6, pp.9-14, 2020. DOI: 10.5815/IJMSC.2020.06.02

Reference

[1] A. Bhowmik and U. Menon, "Dragon Crypto - An Innovative Cryptosystem," International Journal of Computer Applications, vol. 176, no. 29, pp. 37-41, 2020. 

[2] R. L. Rivest, A. Shamir and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978. 

[3] D. Pei, A. Saloma and C. Ding, Chinese remainder theorem: applications in computing, coding, cryptography, World Scientific, 1996. 

[4] L. S. Hill, "Cryptography in an algebraic alphabet," The American Mathematical Monthly, vol. 36, no. 6, pp. 306-312, 1929. 

[5] R. Brady, N. Davis and A. Tracy, "Encrypting with Elliptic Curve Cryptography," in MSRI-UP, 2010. 

[6] M. Suzdik, "An elegant pairing function," in Wolfram Research (ed.) Special NKS 2006 Wolfram Science Conference, Washington, DC, 2006. 

[7] S. Henderson, NIST Kick-Starts 'Threshold Cryptography' Development Effort, 2020. 

[8]A. Bhowmik, "CoordinateGeometryCrypto," GitHub, 8 September 2020. [Online]. Available: https://github.com/awnonbhowmik/CoordinateGeometryCrypto.