Cryptography based on transcendental numbers

Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Rei Safavi-Naini

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

2 Citations (Scopus)

Abstract

We investigate irrational numbers as a source of pseudorandom bits. We suggest two secure pseudorandom bit generators based on transcendental numbers. These two classes of transcendentals are applied to construct novel encryption algorithms. Properties of the encryption algorithms are studied and preliminary cryptanalysis is given.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 1st Australasian Conference, ACISP 1996, Proceedings
Place of PublicationBerlin; Heidelberg
PublisherSpringer, Springer Nature
Pages96-107
Number of pages12
Volume1172
ISBN (Print)3540619917, 9783540619918
Publication statusPublished - 1996
Externally publishedYes
Event1st Australasian Conference on Information Security and Privacy, ACISP - 1996 - Wollongong, Australia
Duration: 24 Jun 199626 Jun 1996

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1172
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other1st Australasian Conference on Information Security and Privacy, ACISP - 1996
Country/TerritoryAustralia
CityWollongong
Period24/06/9626/06/96

Fingerprint

Dive into the research topics of 'Cryptography based on transcendental numbers'. Together they form a unique fingerprint.

Cite this