Matrix-based algorithm for text-data hiding and information processing

  • Nenad O. Vesić Prirodno-mat
  • Dušan J. Simjanović Faculty of Science and Mathematics Niš
Keywords: program, decryption, encryption, text, message, public key, private key, algorithm, matrix valued function,

Abstract


An application of differential geometry in hiding text-data is presented in this paper. This application is a generalization of similar previously presented methods. Matrix valued functions of more than one variable are used in text hiding. This method is covered by the corresponding programs in the MATHEMATICA software package and compared with the previously presented method.

 


References

Bohen, D., 1999, Twenty Years of Attacks on the RSA Cryptosystem, Notices of the AMS, 46(2), pp. 203-213.

Buchmann, A. J., 2001, Introduction to Cryptography, NewYork, Springer-Verlag.

Cormen, T. H., Leiserson, C. E., Rivest, R. L., Stein, C., 2009, Introduction to algorithms, Third Edition, Cambridge, Massachusetts London, England, The MIT Press.

Diffie, W., Hellman, M., 1976, New directions in Cryptography, IEEE Transactions on Informations Theory, IT-22.

Kuljanski, R. S., 2010, RSA algoritam i njegova praktična primena, Vojnotehnički glasnik/Military Technical Courier, 58(3), pp. 65-77.

Menezes, A., 2001, Evaluation of Security Level of Cryptography: RSA-OAEP, RSAPSS, RSA Signature, CRYPTREC.

Menezes, A., Oorschot, P., Vanstone, S., 1996, Handbook of Applied Cryptography, CRC Press, Boca Raton.

Vesić N. O., Differential Geometry and Matrices [Internet], Available in: poincare.matf.bg.ac.rs/~geometricalseminar/presentations/vesic.pdf, Downloaded: February 1, 2013.

Vesić N. O., Simjanović D. J., 2012, Tensors and Cryptography, pp. 76-83, InfoTech-2012, September 20-21.

Wolfram, S., 1999, The Mathematica Book, 4th ed., Wolfram Media/Cambridge University Press.

Published
2014/02/26
Section
Original Scientific Papers