Journals Information
Mathematics and Statistics Vol. 12(2), pp. 135 - 141
DOI: 10.13189/ms.2024.120203
Reprint (PDF) (337Kb)
Applications of Onto Functions in Cryptography
K Krishna Sowmya 1,*, V Srinivas 2
1 Department of Mathematics, TSWRDC(W) Mahabubnagar, Telangana, India
2 Department of Mathematics, University College of Science, Osmania University, India
ABSTRACT
The concept of onto functions plays a very important role in the theory of Analysis and has got rich applications in many engineering and scientific techniques. Here in this paper, we are proposing a new application in the field of cryptography by using onto functions on the algebraic structures like rings and fields to get a strong encryption technique. A new symmetric cryptographic system based on Hill ciphers is developed using onto functions with two keys- Primary and Secondary, to enhance the security. This is the first algorithm in cryptography developed using onto functions which ensures a strong security for the system while maintaining the simplicity of the existing Hill cipher. The concept of using two keys is also novel in the symmetric key cryptography. The usage of onto functions in the encryption technique eventually gives the highest security to the algorithm which has been discussed through different examples. The original Hill cipher is obsolete in the present-day technology and serves as pedagogical purpose but whereas this newly proposed algorithm can be safely used in the present-day technology. Vulnerability from different types of attacks of the algorithm and the cardinality of key spaces have also been discussed.
KEYWORDS
Onto Function, Cryptography, Encryption, Decryption, Hill Ciphers, Matrices
Cite This Paper in IEEE or APA Citation Styles
(a). IEEE Format:
[1] K Krishna Sowmya , V Srinivas , "Applications of Onto Functions in Cryptography," Mathematics and Statistics, Vol. 12, No. 2, pp. 135 - 141, 2024. DOI: 10.13189/ms.2024.120203.
(b). APA Format:
K Krishna Sowmya , V Srinivas (2024). Applications of Onto Functions in Cryptography. Mathematics and Statistics, 12(2), 135 - 141. DOI: 10.13189/ms.2024.120203.