Abstract
The use of digital contents has increased tremendously in this modern era. In fact, people spend more time on internet than ever which urged the computer scientists and mathematicians to develop new techniques for data security during transmission and when data is at rest. To cover a digital content is not a one-size-fits all type solution, in fact it requires multiple techniques. In this article we have used elliptic curves, finite state machines, Pauli spin half matrices for image encryption. Elliptic curve discrete log problem makes it difficult for the adversary to extract any information about the key. To authenticate the robustness of the system against cryptographic attacks several statistical analyses are performed.
| Original language | English |
|---|---|
| Pages (from-to) | 3631-3650 |
| Number of pages | 20 |
| Journal | International Journal of Theoretical Physics |
| Volume | 60 |
| Issue number | 9 |
| DOIs | |
| State | Published - Sep 2021 |
| Externally published | Yes |
Keywords
- Elliptic curve
- Finite state machine
- Pauli half spinning
Fingerprint
Dive into the research topics of 'Pauli Half Spinning and Elliptic Curve Based Information Confidentiality Mechanism'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver