Skip to main content
Log in

Computationally efficient algorithms for a one-time pad scheme

  • Published:
International Journal of Computer & Information Sciences Aims and scope Submit manuscript

Abstract

The use of cryptography for data protection has received a great deal of attention in recent years. This paper presents computationally efficient algorithms for the implementation of a one-time pad scheme. The algorithms to encipher and decipher text were implemented on aPDP-11 computer using the programming languageC. To study the behavior of the keys used to encipher and decipher text, we used the chi-square method, and the test results of two runs are presented with some statistical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. A. G. Akritas, An implementation of Vincent's theorem,Numerishche Mathematik 36:53–62 (1980).

    Google Scholar 

  2. A. G. Akritas, The fastest exact algorithms for the isolation of the real roots of a polynomial equation,Computing 24:299–313 (1980).

    Google Scholar 

  3. A. G. Akritas, Exact algorithm for the implementation of Cauchy's rule,Int. J. Comp. Math. 9:323–333 (1981).

    Google Scholar 

  4. A. G. Akritas, Application of Vincent's theorem in cryptography or one-time pads made practical,Cryptologia 6(4):312–318 (1982).

    Google Scholar 

  5. A. G. Akritas and S. D. Danielopoulos, On the complexity of algorithms for the translation of polynomials,Computing 24:51–60 (1980).

    Google Scholar 

  6. A. G. Akritas and S. D. Danielopoulos, An unknown theorem for the isolation of the roots of polynomials,Ganita Bharati 2(3/4):41–49 (1980).

    Google Scholar 

  7. W. F. Ehrsam, S. M. Matyas, C. H. Meyer, and W. L. Tuchman, A cryptographic key management scheme for implementing the data encryption standard,IBM Syst. J. 17(2):106–125 (1978).

    Google Scholar 

  8. W. Diffie and M. E. Hellman, A critique of the proposed date encryption standard,Comm. ACM (March 1976), pp. 164–165.

  9. E. Gudes, The design of a cryptography based secure file system,IEEE Trans. Software Eng. SE-6(5):411–420 (September 1980).

    Google Scholar 

  10. E. Gudes, F. A. Stahl, and H. E. Koth, Applications of cryptographic transformations to data base security, inProceedings of National Computer Conference (1976).

  11. B. W. Kernighan and D. M. Ritchie,The C Programming Language, Prentice-Hall, Englewood Cliffs, New Jersey (1978).

    Google Scholar 

  12. D. E. Knuth,The Art of Computer Programming, Addison Wesley, Reading, Mass., Vol. 2, pp. 1–70 (1969).

    Google Scholar 

  13. S. Lang and H. Trotter, Continued franctions for some algebraic numbers,J. Reine Angew. Math. 255:122–134 (1972).

    Google Scholar 

  14. R. C. Merkle, Secure communications over insecure channels,Comm. ACM 1978:194–299.

  15. K. H. Ng, Polynomial real root approximation using continued fractions, M.S. Research Report, Department of Computer Science, University of Kansas, Lawrence, Kansas (1980).

    Google Scholar 

  16. S. M. Pizer,Numerical Computing and Mathematical Analysis, Science Research Associates, Chicago, pp. 187–217 (1975).

    Google Scholar 

  17. G. B. Purdy, A high security log-in procedure,CACM 17 (August 1974).

  18. A. Rampuria, A secure method for cryptography, M.S. Research Report, Department of Computer Science, University of Kansas, Lawrence, Kansas (1982).

    Google Scholar 

  19. J. V. Uspensky,Theory of Equations, McGraw-Hill, New York (1948).

    Google Scholar 

  20. A. J. H. Vincent, Sur la résultion des équation numeriques,J. Math. Pures Appl. 1:341–372 (1836).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Additional information

This author was partially supported by the General Research Fund (No. 3230-20-0038) of the University of Kansas.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Akritas, A.G., Iyengar, S.S. & Rampuria, A.A. Computationally efficient algorithms for a one-time pad scheme. International Journal of Computer and Information Sciences 12, 285–316 (1983). https://doi.org/10.1007/BF00991623

Download citation

  • Received:

  • Revised:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF00991623

Key words

Navigation