Key Generation Algorithms Using Difference Equations with Multi-Precision Arithmetic: A Review

Year : 2024 | Volume : 11 | Issue : 03 | Page : 23 36
    By

    Nalini S,

  1. Head & Assistant Professor, Department of Mathematics, Arulmigu Arthanareeswarar Arts and Science College, Tiruchengode, Tamil Nadu, India

Abstract

Modern cryptographic systems rely on robust key generation to secure data and communication. This review explores the integration of difference equations and multi-precision arithmetic for cryptographic key generation, addressing limitations in traditional methods like pseudorandom number generators and chaotic systems. Difference equations produce deterministic yet chaotic sequences ideal for cryptography due to their sensitivity to initial conditions and nonlinearity. However, finite precision arithmetic can lead to periodicity and loss of randomness, compromising security. Multi-precision arithmetic overcomes these challenges by enabling computations with arbitrary precision, supporting the generation of extended, nonperiodic sequences, and expanding the cryptographic key space. This paper reviews the theoretical foundations of difference equations and their cryptographic relevance, examines multi-precision arithmetic’s role in enhancing sequence quality and highlights research progress in combining these approaches. Key advancements include generating longer, high entropy keys suitable for modern cryptographic needs, especially in resource-constrained environments like Internet of Things (IoT) and blockchain applications. The review identifies gaps, such as computational efficiency, scalability, and resistance to emerging threats, including quantum computing. It also proposes directions for future research, including adaptive parameter selection, hybrid systems, and enhanced randomness testing. This synthesis underscores the potential of difference equations and multi-precision arithmetic as a transformative approach to secure key generation, ensuring robust and scalable cryptographic solutions

Keywords: Cryptographic key generation, difference equations, multi-precision arithmetic, pseudorandom sequences, Chaotic systems, nonlinear dynamics, quantum-resistant cryptography

[This article belongs to Research & Reviews: Discrete Mathematical Structures ]

How to cite this article:
Nalini S. Key Generation Algorithms Using Difference Equations with Multi-Precision Arithmetic: A Review. Research & Reviews: Discrete Mathematical Structures. 2025; 11(03):23-36.
How to cite this URL:
Nalini S. Key Generation Algorithms Using Difference Equations with Multi-Precision Arithmetic: A Review. Research & Reviews: Discrete Mathematical Structures. 2025; 11(03):23-36. Available from: https://journals.stmjournals.com/rrdms/article=2025/view=206344


References

  1. Ameer H. Cryptographic key generation using fingerprint biometrics. University of Thi-Qar Journal of Science. 2015;5:75–80. DOI: 10.32792/utq/utjsci/v5i2.125.
  2. Annaby MH, Ayad HA, Rushdi MA. A difference-equation-based robust image encryption scheme with chaotic permutations and logic gates. J Math Imaging Vis. 2022;64:855–68. DOI: 10.1007/s10851-022-01099-7.
  3. Assad SE, editor. Cryptography and Its Applications in Information Security. Basel, Switzerland: MDPI; 2022. DOI: https://doi.org/10.3390/books978-3-0365-3768-9.
  4. Blum M, Micali S. How to generate cryptographically strong sequences of pseudorandom bits. SIAM J Comput. 1984;13:850–64. DOI: 10.1137/0213053.
  5. Chen J, Zhou J, Wong KW, Ji Z. Enhanced cryptography by multiple chaotic dynamics. Math Probl Eng. 2011;2011:938454. DOI: 10.1155/2011/938454.
  6. Daisaka H, Nakasato N, Makino J, Yuasa F, Ishikawa T. GRAPE-MP: An SIMD accelerator board for multi-precision arithmetic. Procedia Comput Sci. 2011;4:878–87. DOI: 10.1016/j.procs.2011.04.093.
  7. Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;22:644–54. DOI: 10.1109/TIT.1976.1055638.
  8. Ditto W, Munakata T. Principles and applications of chaotic systems. Commun ACM. 1995;38:96–102. DOI: 10.1145/219717.219797.
  9. Veena G, Ramakrishna M. A survey on image encryption using chaos-based techniques. Int J Adv Comput Sci Appl. 2021;12. DOI: 10.14569/IJACSA.2021.0120145.
  10. Golomb SW. Shift Register Sequences. United States: Aegean Park Press; 1982.
  11. Hajomer AAE, Zhang L, Yang X, Hu W. 284.8-Mbps physical-layer cryptographic key generation and distribution in fiber networks. J Lightwave Technol. 2021;39:1595–601. DOI: 10.1109/JLT.2020.3042906.
  12. Hutter M, Wenger E. Fast multi-precision multiplication for public-key cryptography on embedded microprocessors. J Cryptol. 2020;33:1442–60. DOI: 10.1007/s00145-020-09351-2.
  13. Knuth DE. The Art of Computer Programming. 3rd ed. Boston: Addison-Wesley; 1997.

Regular Issue Subscription Review Article
Volume 11
Issue 03
Received 24/12/2024
Accepted 31/12/2024
Published 03/01/2025
Publication Time 10 Days


Login


My IP

PlumX Metrics