Online Submission!

Open Journal Systems

An ElGamal Encryption Scheme of Adjacency Matrix and

B. Ravi Kumar, A. Chandra Sekhar, G. Appala Naidu



Cryptography is the combination of Mathematics and Computer science. Cryptography is used for encryption and decryption of data using mathematics. Cryptography transit the information in an illegible manner such that only intended recipient will be able to decrypt the information. In the recent years, researchers developed several new encryption methods. Among such ElGamal encryption is the one laid a concede platform for the researchers in Cryptography. Ever science several mathematical models were applied for encryption/decryption. In this paper, we introduced an ElGamal encryption, which uses points on the elliptic curve, and finite state machines and adjacency matrix.

Full Text:



. N.Kobliz.Elliptic curve Cryptosystem

Mathematics of computation, 48203-

, 1987.

. A text book of Guide to elliptic curve

Cryptography by Darrel Hancott


. N. Kobliz. Hyper Elliptic Cryptosystem.

International Journal of Cryptography,

-150, 1989.

. An introduction to the theory of Elliptic

Curves by Joseph H.Silverman brown

University and NTRU Cryptosystems.

. A text book of Cryptography and

Network Security by William Stallings.

. Adesh K.Pandey. reprint 2009, “An

introduction to automata theory and

formal languages S.K.Kararia & sons.

New Delhi.

. Johan E.Hopcroft, Rajeev Motwin,

Jeffrey D.Uiman. “Introduction to

automata theory, language, and

computation ” Vanstone 3 rd impression,

CRC press, Dorling Kindersley



. P.A.Jyotirmie, B.Ravi Kumar,

A.Chandra Sekhar, S.Uma Devi “A One

to one Correspondence in elliptic Curve

Cryptography” International Journal

of Mathematical archive-4(3),2013: 300-

. B.krishna Gandhi, A.Chandra Sekhar,

S.Srilaksmi. “Cryptography Scheme

for Digital Signals using Finite State

Machines” International Journal of Computer Applications, September 2011.

K.R.Sudha , A.chandra Sekhar ,PrasadReddy P.V.G.D. “Cryptography Protection of Digital Signals usingSome recurrence relations” International Journal of Computer Science and Network security, Vol (7) no 5 may 2007, 203-207.

T.ElGamal,“A public-key cryptosystem and a signature scheme based on discrete logarithms”, IEEE Transactions on Information Theory, on Information Theory, 469- 472, 1985.



  • There are currently no refbacks.