New Method in Encryption

Enas Y. Abdullah

Abstract


Encryption in this paper includes the use of  three values which they are the two shadows values of a base value, and the base value is attained from the three shadows values . Encryption  based on two keys was proposed to increase the security of single encryption. We introduce a novel combination of  asymmetric (two public –key) and symmetric ( private-key). Public key and private key  involves odd and even whole values (first shadow value , second shadow value and third shadow value) . shadows values are multiplied making a product value and the value of 1 is subtracted from the produce value, The base value is along with the chosen shadows values ,then we employ  values to find public key to encrypt message and private key to decrypt the encrypted message , as well as introduce new ideal to conclude the private key from the public key in two method ,first method determine the values agreed on some of them between the sender and the recipient . Second raised prime number to different value.

Key words: Encryption,  shadows value,  public key, private key


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: CEIS@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2863

Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org