International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Russia | Volume 1 Issue 1, October 2012

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Noise-resistant modular cryptographic system that functions in polynomial residue classes is considered in this article. An algorithm for bases expansion of the cryptographic system is suggested. An estimation of interference-stability of proposed cryptographic system in relation to the traditional system is presented.

Keywords: Chinese Remainder Theorem, cryptanalyst, cryptography, cryptosystem, modular arithmetic, polynomial residue classes, Galois fields, interference coding

Edition: Volume 1 Issue 1, October 2012

Pages: 5 - 9


How to Cite this Article?

O. Finko, D. Samoylenko, "Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSR10120103, Volume 1 Issue 1, October 2012, 5 - 9

33 PDF Views | 58 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Chinese Remainder Theorem'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2447 - 2449

Enhanced Security Providing using Visual Cryptography

Ketan Raju Kundiya, Ram B. Joshi

Share this article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this article

Similar Articles with Keyword 'cryptanalyst'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 549 - 553

Enhancing the Security of Playfair Square Cipher by Double Substitution and Transposition Techniques

Jawad Ahmad Dar, Amit Verma

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1613 - 1619

Design and Analysis of Modified Playfair Square Cipher Algorithm Using 6 By 6 Matrix with Five Iteration Steps and its Implementation in C/C++

Monika Arora, Anish Sandiliya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 6, June 2017

Pages: 1507 - 1513

Encryption and Decryption Using Bit Operations

Gurubasava, Rajesh Budihal

Share this article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this article

Similar Articles with Keyword 'cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 1720 - 1723

Text Steganography using Helping Verbs

Rahul Sanwal, Rishabh Jain

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1344 - 1346

A Quality Maintain Visual Cryptography Scheme

Anju G

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Similar Articles with Keyword 'cryptosystem'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 964 - 968

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2334 - 2337

Providing Sender Anonymity with Message Authentication in Sensor Networks using Elliptic Curve Digital Signature Algorithm

Priya T V, Sreerag B M

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1258 - 1261

Multilevel Cryptosystem for Authorized Deduplication in Hybrid Cloud

P. Narasimhulu, Jayavarthini.C

Share this article

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this article

Similar Articles with Keyword 'modular arithmetic'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 977 - 979

Development of New Algorithm for Finding Inverse of Modular Multiplication

Dr. J. Thirumaran, S. Raja

Share this article

Research Paper, Computer Science & Engineering, Russia, Volume 1 Issue 1, October 2012

Pages: 5 - 9

Cryptographic System in Polynomial Residue Classes for Channels with Noise and Simulating Attacker

O. Finko, D. Samoylenko

Share this article

Top