2010 IEEE 2nd International Advance Computing Conference (IACC) 2010
DOI: 10.1109/iadcc.2010.5423007
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of stream cipher system based on representation of integers in Residue Number System

Abstract: Residue Number Systems (RNS) based on ChineseRemainder Theorem (CRT) permits the representation of large integers in terms of combinations of smaller ones. The set of all integers from 0 to M-1 with RNS representation and component wise modular addition and multiplication constitutes direct sum of smaller commutative rings. Encryption and decryption algorithm based on the properties of direct sum of smaller rings offers distinct advantages over decimal or fixed radix arithmetic. In this paper representation of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…Generated key sequences over the range [0,14] and [0,16] are applied in image encryption based on RNS stream cipher system. 43 In high resolution medical images, which have to be transferred securely, the proposed system can be used efficiently for encryption/decryption. In this approach, a composite integer m can be represented as a product of k relative prime integers.…”
Section: Application Of Proposed System In Image Encryption and Its Rmentioning
confidence: 99%
See 1 more Smart Citation
“…Generated key sequences over the range [0,14] and [0,16] are applied in image encryption based on RNS stream cipher system. 43 In high resolution medical images, which have to be transferred securely, the proposed system can be used efficiently for encryption/decryption. In this approach, a composite integer m can be represented as a product of k relative prime integers.…”
Section: Application Of Proposed System In Image Encryption and Its Rmentioning
confidence: 99%
“…The security parameters considered for evaluation are the following. The result of the proposed system is compared with standard A5/1 system, 44 RNS cipher system, 43 and RNS cipher system with maximum length sequence. 19…”
Section: Security Parametersmentioning
confidence: 99%
“… Obtain phony modulus using equation (11)  Sender encrypts the plain text (M) by using the key pairs (f, X ) C=M f mod X.…”
Section: A Proposed Algorithmmentioning
confidence: 99%
“…Find private key g using equation (10), hence got g=143/11=13. Equation (11) gives phony modulus X =3361. So public key (517,3361) shared to the sender by keeping private key (13,3361) secret.…”
Section: A Proposed Algorithmmentioning
confidence: 99%
See 1 more Smart Citation