## Cryptology ePrint Archive: Report 2014/335

**SHADOW NUMBERS PUBLIC KEY ENCRYPTION**

*John Almeida*

**Abstract: **The present public key encryption in this paper involves the use
of two values and they are the shadow’s values of a base value, and
the base value is derived from the two shadows’ values. Whenever two
positive whole values (first shadow value and second shadow value) are
multiplied producing a product value and the value of 1 is subtracted
from the product value, a first base value is derived and it is the first base value of the two shadows values. The derived first base value may be divided by any divisor that it can be divided with which produces a positive quotient result and zero for the remainder. All values that are used in the division and the quotient result are bases values for the chosen shadow value-pair. Then one of the base values is chosen along with the two chosen shadows values and they comprise a triplet values that represent the public key to encrypt a message and the private key to decrypt the encrypted message.

**Category / Keywords: **Shadow number, shadow number system, shadow number algorithm, public key encryption, algorithm, public key, private key, encryp- tion

**Date: **received 13 May 2014, last revised 18 May 2014

**Contact author: **john almeida at unoweb com

**Available format(s): **PDF | BibTeX Citation

**Version: **20140518:174301 (All versions of this report)

**Discussion forum: **Show discussion | Start new discussion

[ Cryptology ePrint archive ]