Novel Approach for Encryption using Catalan Numbers

Authors

  • V. Uma Karuna Devi Kakarla Research Scholar, Department of Mathematics, GITAM University, Visakhapatnam, India.
  • CH. Suneetha Associate Professor, Department of Mathematics, GITAM University, Visakhapatnam, India.

Keywords:

Encryption, Polygon triangulation, Decryption Catalan Number, Secure Communication

Abstract

In today's fast-changing digital world, passwords or PIN numbers are needed for everything from financial transactions to confidential correspondence. This practice protects monitory exchanges, financial processes, and secret communications. Sharing a complex PIN or one-time password has emerged to strengthen this security paradigm and protect critical interactions. The Crypto Council for Innovation (CCI) has developed a complete PIN security architecture to improve security. This method relies on encrypted symmetric keys integrated into complex key block architectures. These structures include cautious key usage limits, strengthening the security system. These key blocks avoid the presumption that previously established keys can be reused, promoting dynamic key management and increased security. At the vanguard of these security advances, this research paper painstakingly explains password and PIN encryption and migration. This unique and stable secure communications system uses Catalan number sequences' mathematical elegance. This novel method presents the recipient of encrypted communication with a lengthy, seemingly random sentence that contains the encrypted password or PIN. This encrypted payload is discretely dispersed throughout the text, making its identification and extraction difficult for malevolent actors. Importantly, both the sender and the recipient are blissfully unaware of the PIN characters' precise positions, adding ambiguity that prevents illegal access. In conclusion, the digital landscape requires strong security to protect financial, secret, and covert transactions. Encrypted symmetric keys in dynamic key block structures, certified by the Crypto Council for Innovation, demonstrate a strong commitment to security. The encryption and migration method, which uses Catalan number sequences to hide passwords and PINs, shows the relentless search of impenetrable security in an increasingly linked world.

Downloads

Download data is not yet available.

References

Yildirim. M and Mackie. I, “Encouraging users to improve password security and memorability”, International Journal of Information Security (2019), ISSN 1615-5262, https://doi.org/10.1007/s10207-019-00429-y.

Shay et-al, “Encountering Stronger Password Requirements: User Attitudes and Behaviors”, Symposium on Usable Privacy and Security (SOUPS) 2010, July 14–16, 2010, Redmond, WA USA.

Florencio, D. et-al, “A large-scale study of web password habits”,International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007, DOI:10.1145/1242572.1242661.

Perrig et-al, “Tree-based Group Key Agreement”, ACM Transactions on Information and System Security 7(1), February 2002, DOI:10.1145/984334.984337.

Sweta Mishra, the thesis titled “Design and Analysis of Password-based Authentication Systems” Indraprastha Institute of Information Technology, Delhi, 2017.

Katha Chanda,”Password Security: An Analysis of Password Strengths and Vulnerabilities” International Journal of Computer Network and Information Security, 2016, 7, 23-30 Published Online July 2016 in MECS, DOI: 10.5815/ijcnis.2016.07.04

D. Sravana Kumar, C. H. Suneetha, and P. Sirisha. "New password embedding technique using elliptic curve over finite field",

http://doi.org/10.1007/978-981-13-6001-5_15

Saracevic, Muzafer, Mohamed Elhoseny, AybeyanSelimi, and Zoran Lončeravič. "Possibilities of applying the triangulation method in the biometric identification process."

Amounas F., El-Kinani E.H., Hajar M.: “Novel Encryption Schemes Based on Catalan Numbers”, International Journal of Information and Network Security, vol. 2(4), pp. 339-347, 2013.

Higgins P.M.: “Number Story: From Counting to Cryptography”, Springer Science and Business Media, Berlin, Germany, 2008.

Horak P., Semaev I., Tuza I.Z.: “An application of Combinatorics in Cryptography”, Electronic Notes in Discrete Mathematics, vol. 49, pp. 31-35, 2015.

Koscielny C., Kurkowski M., Srebrny M.: “Modern Cryptography Primer: Theoretical Foundations and Practical Applications”, Springer Science and Business Media, Berlin, Germany, 2013.

Mohan, B. R. ., M, D. ., Bhuria, V. ., Gadde, S. S. ., M, K. ., & N, A. P. . (2023). Potable Water Identification with Machine Learning: An Exploration of Water Quality Parameters. International Journal on Recent and Innovation Trends in Computing and Communication, 11(3), 178–185. https://doi.org/10.17762/ijritcc.v11i3.6333

Carmen Rodriguez, Predictive Analytics for Disease Outbreak Prediction and Prevention , Machine Learning Applications Conference Proceedings, Vol 3 2023.

Beemkumar, N., Gupta, S., Bhardwaj, S., Dhabliya, D., Rai, M., Pandey, J.K., Gupta, A. Activity recognition and IoT-based analysis using time series and CNN (2023) Handbook of Research on Machine Learning-Enabled IoT for Smart Applications Across Industries, pp. 350-364.

Downloads

Published

21.09.2023

How to Cite

Devi Kakarla, V. U. K. ., & Suneetha, C. . (2023). Novel Approach for Encryption using Catalan Numbers . International Journal of Intelligent Systems and Applications in Engineering, 11(4), 209–214. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/3514

Issue

Section

Research Article