VECTORS ENCRYPTION ALGORITHM AND SOFTWARE Cover Image

VEKTÖRLERLE ŞİFRELEME ALGORİTMASI VE YAZILIMI
VECTORS ENCRYPTION ALGORITHM AND SOFTWARE

Author(s): Remzi Aktay
Subject(s): ICT Information and Communications Technologies
Published by: Sage Yayınları
Keywords: Vector; Scalar Product; Vector Product; Encryption; Algorithm;

Summary/Abstract: In this study, it is aimed to make an encryption algorithm using vector and scalar products of the vectors given in R3. In the literature review, the meaning of vector product and scalar product, how to find it, and its properties were found. However, an encryption algorithm made with vectors has not been found. In this study, two orthogonal vectors taken in R3 and the vector product formed by the vector product of these vectors are used as a method. In addition, plane equations passing through the origin in R3 and integer solutions providing these plane equations are used. In the encryption process, the ASCII character code of each character is converted into a number block, the sum of which consists of 24 integers, giving the value of the code, and three consecutive numbers are prime among them. In this encryption, the message receiver has a key consisting of 24 integers. Here, the number block consisting of 24 integers of the character to be encrypted and the key of the recipient can take infinitely different values. When the software is desired, the code of the character can be made as a number block consisting of as many numbers as desired, different from 24 integers, if desired. The first difference of this algorithm from other algorithms is that when the code of the character to be encrypted is written with 24 integer blocks, it can have infinitely different software. The second difference is that the number block can be created from as many numbers as desired, unlike 24 integers. The third difference is that this algorithm is not an asymmetric or symmetric encryption algorithm. It is an encryption algorithm where only the key is sent to the recipient and the key can take infinitely different values. Using the logic of this encryption algorithm, different encryption algorithms can be made in R4, R5, …….. Rn spaces.

  • Issue Year: 13/2021
  • Issue No: 51
  • Page Range: 319-326
  • Page Count: 8
  • Language: Turkish
Toggle Accessibility Mode