Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Russia | Volume 1 Issue 1, October 2012

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Noise-resistant modular cryptographic system that functions in polynomial residue classes is considered in this article. An algorithm for bases expansion of the cryptographic system is suggested. An estimation of interference-stability of proposed cryptographic system in relation to the traditional system is presented.

Keywords: Chinese Remainder Theorem, cryptanalyst, cryptography, cryptosystem, modular arithmetic, polynomial residue classes, Galois fields, interference coding

Edition: Volume 1 Issue 1, October 2012

Pages: 5 - 9

Share this Article

How to Cite this Article?

O. Finko, D. Samoylenko, "Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR10120103, Volume 1 Issue 1, October 2012, 5 - 9

87 PDF Views | 124 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Chinese Remainder Theorem'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this Article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article

Similar Articles with Keyword 'cryptanalyst'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1507 - 1513

Encryption and Decryption Using Bit Operations

Gurubasava, Rajesh Budihal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 229 - 232

Data Encryption and Decryption Process using PSR Methodology and Performance Analysis with RSA

P. Srinivasarao, B. Chaitanya, K. Venkatesh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this Article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article

Similar Articles with Keyword 'cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2657 - 2659

An Outline of Various Secret Sharing Techniques

Kavita Choudhary, Kumar Vaibhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Similar Articles with Keyword 'cryptosystem'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1448 - 1452

Efficient Data Sharing in Cloud Medium with Key Aggregate Cryptosystem

C. Suganya, A. Sangeetha

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1232 - 1234

A Review on Data Sharing Across Cloud Storage Using Key Aggregate Cryptosystem

Rashmi Khawale, Omprakash Tembhurne

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2369 - 2374

Cryptoshare: Cryptosystem for Scalable Data Sharing in Cloud Storage

Ghilby Varghese Jaison

Share this Article

Similar Articles with Keyword 'modular arithmetic'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 977 - 979

Development of New Algorithm for Finding Inverse of Modular Multiplication

Dr. J. Thirumaran, S. Raja

Share this Article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this Article
Top