Volume 29 | Number 2 | Year 2016 | Article Id. IJMTT-V29P519 | DOI : https://doi.org/10.14445/22315373/IJMTT-V29P519
Multiple encryptions is the process of encrypting the plain text more than once. If the plaintext is encrypted twice, then the process of the first encryption is usual encryption and the process of second-time encryption is referred as the superencryption. For multiple encryptions, same or different algorithms can be used. If the same key is used for multiple encryptions, for an attacker it is not that hard to recover the plain text. In this paper, a symmetric cryptosystem is proposed using Fibonacci numbers for the first level of encryption and Affine or Vigenere transformation is employed for super encryption.
[1] "Application of Fibonacci numbers" edited by A.N.Philippou, A.F.Jordan and G.E.Bergun, Springer science media LLC.
[2] A. Chandra Sekhar, Prasad Reddy. P.V.G.D, A.S.N.Murty, B.Krishna Gandhi "Self-Encrypting Data Streams Using Graph Structures" IETECH International Journal Of Advanced Computations PP 007-009, 2008, vol 2 No
[3] A. Chandra Sekhar, K.R. Sudha and Prasad Reddy. P.V.G.D "Data Encryption Technique Using Random Generator" IEEE International Conference on Granular Computing GrC-07, Nov 2-4, 2007, Silicon Valley, USA, PP 576-579.
[4] B.Krishna Gandhi, A. Chandra Sekhar and Prasad Reddy P.V.G.D: Cryptographic Scheme for Digital signals" INTECH International Journal Of Advanced Computations", Vol:2 No:4, PP195-200,2008.
[5] “Cryptography: A very short introduction” by Fred Piper and Sean Murthy.
[6] E.H.Lock Wood, A single-light on pascal's triangle, Math, Gazette 51(1967), PP 243-244.
[7] Fibonacci, Lucas and Pell numbers andpascal's triangle, Thomas Khoshy, Applied Probability Trust, PP 125-132.
[8] Fibonacci and Lucas Numbers with applications Thomas Khouhy ISBN: 978-0-471-39969-8.
[9] J.Buchman"Introduction to cryptography" Springer- Verlag 2001.
[10] K.R.Sudha, A. Chandra Sekhar, P.V.G.D, Prasad Reddy, "Cryptographic Protection Of Digital Signal Using some Recurrence Relations" IJCNS, May 2007, PP203-207.
[11] K.H.Rosen "Elementary number theory and its applications” Third edition, Addison Wesly.
[12] Linear independent spanning sets and linear transformations for multi-level encryption, A.ChandraSekhar, V.Anusha, B.Ravi Kumar, S.Ashok Kumar Vol36(2015) , No.4, PP;385-392.
[13] Neal Koblitz” A course in number theory and cryptography”IBSN 3-578071-8 SPIN 10893308.
[14] B. Ravi Kumar , A. Chandra Sekhar , G.Appala Naidu "A Novel ElGamal Encryption Scheme of Elliptic Curve Cryptography". International Journal of Computer Trends and Technology (IJCTT) V20(2):70-73, Feb 2015. ISSN:2231-2803.
A. ChandraSekhar, D. Chaya Kumari, S. Ashok Kumar, "Symmetric Key Cryptosystem for Multiple Encryptions," International Journal of Mathematics Trends and Technology (IJMTT), vol. 29, no. 2, pp. 140-144, 2016. Crossref, https://doi.org/10.14445/22315373/IJMTT-V29P519