Exponential cipher based on residue number system for the security of text document

Shivani G. Aithal, Smitha N. Pai*

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Residue number system which was inspired by the Chinese remainder theorem provides a method for using groups of smaller numbers to represent large integers. Although cryptographic algorithms based on radix or decimal arithmetic have their advantages, direct sum of smaller rings properties-based algorithms offers better benefits. In this paper, the application of RNS number systems successfully utilized in text security for exponential cipher. RNS-based cipher systems exhibit properties that increase computation speed, reduce the time complexity, and make the system immune to known plain text attacks and algebraic attacks. In addition to this, the characteristics of exponential stream cipher systems, the key generation, and residue number system-based encryption and decryption are discussed in this paper.

    Original languageEnglish
    Title of host publicationAdvances in Control Instrumentation Systems - Select Proceedings of CISCON 2019
    EditorsV.I. George, B.K. Roy
    PublisherSpringer Gabler
    Pages161-171
    Number of pages11
    ISBN (Print)9789811546754
    DOIs
    Publication statusPublished - 2020
    Event16th Control Instrumentation System Conference, CISCON 2019 - Manipal, India
    Duration: 08-11-201909-11-2019

    Publication series

    NameLecture Notes in Electrical Engineering
    Volume660
    ISSN (Print)1876-1100
    ISSN (Electronic)1876-1119

    Conference

    Conference16th Control Instrumentation System Conference, CISCON 2019
    Country/TerritoryIndia
    CityManipal
    Period08-11-1909-11-19

    All Science Journal Classification (ASJC) codes

    • Industrial and Manufacturing Engineering

    Fingerprint

    Dive into the research topics of 'Exponential cipher based on residue number system for the security of text document'. Together they form a unique fingerprint.

    Cite this