67 research outputs found

    Prime Reciprocal Digit Frequencies and the Euler Zeta Function

    Full text link
    Some open questions related to prime reciprocal digit frequencies with potential applications to cryptography are presented.Comment: 6 page

    Visual Secret Sharing Scheme using Grayscale Images

    Full text link
    Pixel expansion and the quality of the reconstructed secret image has been a major issue of visual secret sharing (VSS) schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for black and white (binary) secret images. This paper presents a probabilistic (2, 3)-VSS scheme for gray scale images. Its pixel expansion is larger in size but the quality of the image is perfect when it's reconstructed. The construction of the shadow images (transparent shares) is based on the binary OR operation.Comment: 6 pages, 2 figure

    A New Result on the Random Residue Sequence Algorithm

    Full text link
    Random residue sequences (RR) may be used in many random number applications including those related to multiple access in communications. This paper investigates variations on an algorithm to generate RR sequences that was proposed earlier by the author. This makes it possible to obtain many more random sequences than was possible to do by the previous algorithm. Experimental results are presented on a variety of sequences of length 16 and 24. To obtain a variety of RR sequences of a specific length can have obvious applications in cryptography.Comment: 6 pages,2 table

    Generating Primes Using Partitions

    Full text link
    This paper presents a new technique of generating large prime numbers using a smaller one by employing Goldbach partitions. Experiments are presented showing how this method produces candidate prime numbers that are subsequently tested using either Miller Rabin or AKS primality tests.Comment: 9 pages, 7 figure

    Testing Kak's Conjecture on Binary Reciprocal of Primes and Cryptographic Applications

    Full text link
    This note considers reciprocal of primes in binary representation and shows that the conjecture that 0s exceed 1s in most cases continues to hold for primes less one million. The conjecture has also been tested for ternary representation with similar results. Some applications of this result to cryptography are discussed.Comment: 5 pages, 4 figure

    Binary Random Sequences Obtained From Decimal Sequences

    Full text link
    This paper presents a twist to the generation of binary random sequences by starting with decimal sequences. Rather than representing the prime reciprocal sequence directly in base 2, we first right the prime reciprocal in base 10 and then convert it into the binary form. The autocorrelation and cross-correlation properties of these binary random (BRD) sequences are discussed.Comment: 10 page

    New Class of Pseudorandom D-sequences to Generate Cryptographic Keys

    Full text link
    This article proposes the use of pseudorandom decimal sequences that have gone through an additional random mapping for the design of cryptographic keys. These sequences are generated by starting with inverse prime expansions in base 3 and then replacing 2 in the expansion with either the string 01 or 10 based on the preceding bit, which represents a general mapping. We show that the resulting pseudorandom sequences have excellent autocorrelation properties. Such a method can be extended to inverse prime expansions to any base.Comment: 8 pages, 6 figure

    Indexing Properties of Primitive Pythagorean Triples for Cryptography Applications

    Full text link
    This paper presents new properties of Primitive Pythagorean Triples (PPT) that have relevance in applications where events of different probability need to be generated and in cryptography.Comment: 8 page

    A Wireless System Using Random Residue Sequences

    Full text link
    This paper describes the architecture of wireless communication system using random residue sequences. The basic scheme is that of spread spectrum but instead of using PN sequences for coding, we use random residue sequences. Such a system can provide cryptographic security whose strength would depend on the number of code sequences being used.Comment: 3 figure

    Goldbach Circles and Balloons and Their Cross Correlation

    Full text link
    Goldbach partitions can be used in creation of ellipses and circles on the number line. We extend this work and determine the count and other properties of concentric Goldbach circles for different values of n. The autocorrelation function of this sequence with respect to even and odd values suggests that it has excellent randomness properties. Cross correlation properties of ellipse and circle sequences are provided that indicate that these sequences have minimal dependencies and, therefore, they can be used in spread spectrum and other cryptographic applications.Comment: 9 pages, 7 figure
    • …
    corecore