6 research outputs found

    Pell Coding and Pell Decoding Methods with Some Applications

    Get PDF
    We develop a new coding and decoding method using the generalized Pell (p,i)(p,i)-numbers for p=1p=1. The relations among the code matrix elements, error detection, and correction have been established for coding theory when p=i=1p=i=1. We give two new blocking algorithms using Pell numbers and generalized Pell (p,i)(p,i)-numbers for p=1p=1

    Encryption and Decryption of the Data by Using the Terms of the Lucas Series

    Get PDF
    The sequence, whose initial condition is 2 and 1, obtained by summing the two terms preceding it, is called the Lucas sequence. The terms of this series continue as 2, 1, 3, 4, 7, 11, 18, 29, ... respectively. The features of the Lucas sequence have been studied in many projects in the literature and many studies have been done on Lucas series in applied sciences. Cryptology is the science that deals with encrypting data, transferring it securely from one point to another, and converting the encrypted data to the previous one. It includes cryptography and cryptoanalysis. Different encryption-decryption methods have been developed to ensure the security of the data from the past to the present. Some of these are Caesar, Affine, Vigenere and RSA. There are two types of encryption systems in cryptology. The first one is symmetric (secret key) encryption and the another one is asymmetric (public key) encryption. In this study; using the features of the Lucas sequence, studies on cryptology, which deals with the correct encryption, transfer and decryption of data, have been carried out and an example of cryptology algorithm has been given. With Lucas cipher, the letters in the alphabet and the space character are each mapped to the terms of the Lucas sequence. Later, starting from the first term of the Lucas sequence, the encryption was strengthened by adding Lucas terms. As a result, the text to be encrypted has been turned into a symbolic representation of the numbers. Then, the necessary information for deciphering the text which is encrypted with numbers is given
    corecore