Journal of Engineering and Applied Sciences

Year: 2006
Volume: 1
Issue: 2
Page No. 98 - 102

Private-Key Generation for Secured Electronic Transactions

Authors : M. Ismail Jabiullah and M. Lutfar Rahman

Abstract: A new private-key generation technique has been designed, developed and implemented. The technique is based on three-level composite function. A randomly taken and uniquely permuted vector has been taken as input of the first function and produced output as an integer form. The first function`s output and a matrix form are taken as the input of the secured function and produced output an integer that forms another matrix. Taking the above two functions as input parameter, the third function produced the final matrix as the output. The third matrix is the produced private-key and has been used to generate ciphertext from the communicating plaintext. The complexity of the generating private-key has also been measured and found very high for the intruder.

How to cite this article:

M. Ismail Jabiullah and M. Lutfar Rahman , 2006. Private-Key Generation for Secured Electronic Transactions. Journal of Engineering and Applied Sciences, 1: 98-102.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved