Hybrid Algorithms Use Monomials in Encryption

Main Article Content

Awni M. Gaftan
Atyaf A. Abd

Abstract

In this study we used Diffie-Hellman (D-H) method with algorithms used monomials to get on hybrid algorithms to find a new key which can be used in clear text encryption

Article Details

How to Cite
Awni M. Gaftan, & Atyaf A. Abd. (2020). Hybrid Algorithms Use Monomials in Encryption. Tikrit Journal of Pure Science, 25(3), 110–115. https://doi.org/10.25130/tjps.v25i3.257
Section
Articles

References

[1] Blom .R, (Non–Public Key Distribution In: Advances in Cryptology), Chaum, D.(Ed).Plenum press, New York, USA. ISBN:978-1-4757-0604-8,pp:231-236,1983.

[2] Rock .A, ( Pseudorandom Number Generators for Cryptographic Applications) University Salzburg, Austria , Pages: 108, 2005.

[3] Stinson .D.R, (Cryptography: Theory and Practice), CRC press, Boca Raton, Florida, USA, ISBN:9780849385216, Pages:434, 1995.

[4] S.C.COUTINHO, (The Mathematics of Ciphers ; Number Theory and RSA Cryptography), Department of Compute Science Federal University of Riode Janeiro, Brazil, 1997.

[5] Awni M.Gaftan, Akram S.Mohammed and Osama H.Subhi (Cryptography by using Hosoya polynomials for Graphs Groups of Integer Module and Dihedral Groups with Immersion Property), Ibn Al Haitham Jour for Pure and Apple . sci, IHJPAS: VOL. 31 (3) 2018 .

[6] Karl-Heinz. F, (Groups, Rings and Field), Uppsala, 2010.

[7] D. Saba .N.M, (Foundations of Mathematics), College of Ibn Al Haitham Of Science, University of Baghdad, Lectures Notes in Fund, 2010.

[8] Gautam Kumar and Hem raj Saini, (Novel Noncommutative Cryptography Scheme Using Extra Special Group), Security and Communication Networks, University of Information Techndogy Solan, 21 page, India 2017.

[9] Z. Cao, X .Dong and L. Wang, (New public key cryptosystems using polynomials over noncommutative), Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, P.R, China, 2002.

[10] William Stallings,( Cryptography and Network Security Principles and Practices Fourth Edition), Publisher: Prentice Hall, ISBN-10: 0-13-187316-4, 2005.

[11] Sivahagaswathi Kallam, (Diffie-Hellman: Key Exchange and Public Key Cryptosystems),Math and computer Science Department,(MSC. TH.) Indiana state University, Terre Haute, IN, USA, 2015.

[12] Wajdy A. A, (Introduction to Classical Cryptography), Romansy, Sudan Geek, 2007.

[13] Murray Eisenberg,(Hill ciphers and Modular Linear Algebra), Copyright © 1998 by Murray Eisenberg, November 3, 1999.