Approach of Message Communication Using Fibonacci Series: In Cryptology
2014-09-02 11:49:24 来源: 评论:0 点击:
Abstract—The objective of cryptography is to make it feasible for more than one person to do secure communication without intrusion. In the process of sending messages, security of the message is an important challenge as the messages are more vital or secret and protecting data stored in and transferred between distributed components from unauthorized access is very important. Cryptography provides various ways to safe guard messages but here the proposed method will be more concerned with a technique of encoding the text in such a way that the recipient can only discover the original message without any data loss or without any alteration or data getting leaked. In this paper highlights the problem and provides some possible approach to solve this problem using Fibonacci series. The Encryption of data is done by combining the original data with Fibonacci numbers to get a Cipher text which is non-understandable to any intruder. Only the receiver knows the logic to do so.
Index Terms—encryption, decryption, fibonacci, cipher text
Cite: Syed Khutubuddin Ahmed Khadri, Debabrata Samanta, and Mousumi Paul, "Approach of Message Communication Using Fibonacci Series: In Cryptology," Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 168-171, June 2014. doi: 10.12720/lnit.2.2.168-171
Index Terms—encryption, decryption, fibonacci, cipher text
Cite: Syed Khutubuddin Ahmed Khadri, Debabrata Samanta, and Mousumi Paul, "Approach of Message Communication Using Fibonacci Series: In Cryptology," Lecture Notes on Information Theory, Vol. 2, No. 2, pp. 168-171, June 2014. doi: 10.12720/lnit.2.2.168-171
Array
相关热词搜索:
上一篇:Aircraft Component Detection Based on 3D Object Recognition and Relative Position Estimation
下一篇:Fibonacci Based Text Hiding Using Image Cryptography
分享到:
收藏
评论排行
频道总排行
频道本月排行
- 22-Leyer Security System for Hi...
- 2Approach of Message Communicati...
- 1An Efficient Handover Predictio...
- 1Reduced Search Iterative Detect...
- 1Distribution Network Fault Loca...
- 1Estimating Resource Distribution...
- 1Aircraft Component Detection Ba...
- 1Fibonacci Based Text Hiding Using Image Cryptography
- 1Hierarchy Construction of Mathematical Knowledge
- 0Optimization of Location Aware...