Paper 2014/335

SHADOW NUMBERS PUBLIC KEY ENCRYPTION

John Almeida

Abstract

The present public key encryption in this paper involves the use of two values and they are the shadow’s values of a base value, and the base value is derived from the two shadows’ values. Whenever two positive whole values (first shadow value and second shadow value) are multiplied producing a product value and the value of 1 is subtracted from the product value, a first base value is derived and it is the first base value of the two shadows values. The derived first base value may be divided by any divisor that it can be divided with which produces a positive quotient result and zero for the remainder. All values that are used in the division and the quotient result are bases values for the chosen shadow value-pair. Then one of the base values is chosen along with the two chosen shadows values and they comprise a triplet values that represent the public key to encrypt a message and the private key to decrypt the encrypted message.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Shadow numbershadow number systemshadow number algorithmpublic key encryptionalgorithmpublic keyprivate keyencryp- tion
Contact author(s)
john almeida @ unoweb com
History
2014-05-18: last of 4 revisions
2014-05-15: received
See all versions
Short URL
https://ia.cr/2014/335
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/335,
      author = {John Almeida},
      title = {{SHADOW} {NUMBERS} {PUBLIC} {KEY} {ENCRYPTION}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/335},
      year = {2014},
      url = {https://eprint.iacr.org/2014/335}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.