8 research outputs found

    The Interpolating Random Spline Cryptosystem and the Chaotic-Map Public-Key Cryptosystem

    Get PDF
    The feasibility of implementing the interpolating cubic spline function as encryption and decryption transformations is presented. The encryption method can be viewed as computing a transposed polynomial. The main characteristic of the spline cryptosystem is that the domain and range of encryption are defined over real numbers, instead of the traditional integer numbers. Moreover, the spline cryptosystem can be implemented in terms of inexpensive multiplications and additions. Using spline functions, a series of discontiguous spline segments can execute the modular arithmetic of the RSA system. The similarity of the RSA and spline functions within the integer domain is demonstrated. Furthermore, we observe that such a reformulation of RSA cryptosystem can be characterized as polynomials with random offsets between ciphertext values and plaintext values. This contrasts with the spline cryptosystems, so that a random spline system has been developed. The random spline cryptosystem is an advanced structure of spline cryptosystem. Its mathematical indeterminacy on computing keys with interpolants no more than 4 and numerical sensitivity to the random offset t( increases its utility. This article also presents a chaotic public-key cryptosystem employing a one-dimensional difference equation as well as a quadratic difference equation. This system makes use of the El Gamal’s scheme to accomplish the encryption process. We note that breaking this system requires the identical work factor that is needed in solving discrete logarithm with the same size of moduli

    Description of Hygiene and Sanitation of Restaurants in Bajawa District, East Nusa Tenggara

    Get PDF
    A restaurant is a place that provides food and drinks to the public. Therefore, the hygiene and sanitation of the restaurant are vital to ensure the health of that foods and drinks. This study aims to describe the hygiene and sanitation of restaurant according to variables of location and building, sanitation facilities, kitchen, dining room, and food’s storage, food ingredients and fast food, food processing, food ingredients, and fast-food storages, serving of food and equipment used. This study used descriptive with an observational method to all restaurants in Bajawa District from January to February 2020. The sample was 25 restaurants taken using the total sampling technique. The result showed that 100% (25) restaurants in Bajawa District qualified for variables of location and building, food ingredients and food storages, and the equipment used. However, the variable of sanitation facilities showed that 84% (21) of the restaurants were not qualified. Moreover, all sample restaurants (100%) in Bajawa District were not qualified for variables of kitchen, dining room and food storage, food processing, and serving of food. Overall, 56% (14) of restaurants were not qualified for hygiene and sanitation requirements. Therefore, government or related health offices should continuously supervise the implementation of restaurant hygiene and sanitation

    Blockchain research, practice and policy: Applications, benefits, limitations, emerging research themes and research agenda

    Get PDF
    YesThe blockchain has received significant attention from technology focussed researchers, highlighting its perceived impact and emerging disruption potential, but has been slow to engender any significant momentum within the Information Systems (IS) and Information Management (IM) literature. This study approaches the subject through an IS/IM lens developing the key themes from the blockchain based research via a comprehensive review. This analysis of the body of literature highlights that although few commercial grade blockchain applications currently exist, the technology demonstrates significant potential to benefit a number of industry wide use cases. This study expands on this point articulating through each of the key themes to develop a detailed narrative on the numerous potential blockchain applications and future direction of the technology, whilst discussing the many barriers to adoption. The study asserts that blockchain technology has the potential to contribute to a number of the UN Sustainability Development Goals and engender widespread change within a number of established industries and practices

    The interpolating random spline cryptosystem and the chaotic-map public-key cryptosystem

    No full text
    The feasibility of implementing the interpolating cubic spline function as encryption and decryption transformations is presented. The encryption method can be viewed as computing a transposed polynomial. The main characteristic of the spline cryptosystem is that the domain and range of encryption are defined over real numbers, instead of the traditional integer numbers. Moreover, the spline cryptosystem can be implemented in terms of inexpensive multiplications and additions. Using spline functions, a series of discontiguous spline segments can execute the modular arithmetic of the RSA system. The similarity of the RSA and spline functions within the integer domain is demonstrated. Furthermore, we observe that such a reformulation of RSA cryptosystem can be characterized as polynomials with random offsets between ciphertext values and plaintext values. This contrasts with the spline cryptosystems, so that a random spline system has been developed. The random spline cryptosystem is an advanced structure of spline cryptosystem. Its mathematical indeterminacy on computing keys with interpolants no more than 4 and numerical sensitivity to the random offset ti increases its utility. This article also presents a chaotic public-key cryptosystem employing a one-dimensional difference equation as well as a quadratic difference equation. This system makes use of the El Gamal’s scheme to accomplish the encryption process. We note that breaking this system requires the identical work factor that is needed in solving discrete logarithm with the same size of moduli --Abstract, page iii

    Spline cryptosystem

    No full text
    corecore