Pauli Half Spinning and Elliptic Curve Based Information Confidentiality Mechanism

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

The use of digital contents has increased tremendously in this modern era. In fact, people spend more time on internet than ever which urged the computer scientists and mathematicians to develop new techniques for data security during transmission and when data is at rest. To cover a digital content is not a one-size-fits all type solution, in fact it requires multiple techniques. In this article we have used elliptic curves, finite state machines, Pauli spin half matrices for image encryption. Elliptic curve discrete log problem makes it difficult for the adversary to extract any information about the key. To authenticate the robustness of the system against cryptographic attacks several statistical analyses are performed.

Original languageEnglish
Pages (from-to)3631-3650
Number of pages20
JournalInternational Journal of Theoretical Physics
Volume60
Issue number9
DOIs
StatePublished - Sep 2021
Externally publishedYes

Keywords

  • Elliptic curve
  • Finite state machine
  • Pauli half spinning

Fingerprint

Dive into the research topics of 'Pauli Half Spinning and Elliptic Curve Based Information Confidentiality Mechanism'. Together they form a unique fingerprint.

Cite this