Algorithmic Encryption of Natural Numbers Based on the Collatz Conjecture

Notice

This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.

Year : 2025 | Volume : | | Page :
    By

    bahar kuloglu,

  1. Assistant Professor, Department of Engineering Basic Sciences, Sivas, Turkey

Abstract

This paper creates an encryption technique based on the well-known unresolved mathematical problem known as the Collatz conjecture. This conjecture states that every natural number larger than one eventually lowers to one by a set of precise procedures called the Collatz sequence. The study’s methodology associates these sequences’ terms with the Turkish alphabet’s letters. The Collatz transformation is applied to the integer that corresponds to each letter. The words created from these sequences are subjected to addition and subtraction operations during the encryption process. It is challenging to reverse-engineer the original text because of the intricate pattern created by these procedures. This approach uses the Collatz conjecture’s intrinsic complexity and unpredictability to produce a strong encryption scheme. It is intended that this encryption technique will provide a degree of security based on the conjecture’s unproven status, potentially rendering it immune to contemporary cryptographic attacks. In order to advance the science of cryptography, the study aims to investigate the viability of using this unsolved issue as a basis for developing extremely safe encryption algorithms.

Keywords: Collatz Conjecture, Encoding, Decoding, Information Security, Cryptology.

How to cite this article:
bahar kuloglu. Algorithmic Encryption of Natural Numbers Based on the Collatz Conjecture. Research & Reviews: Discrete Mathematical Structures. 2025; ():-.
How to cite this URL:
bahar kuloglu. Algorithmic Encryption of Natural Numbers Based on the Collatz Conjecture. Research & Reviews: Discrete Mathematical Structures. 2025; ():-. Available from: https://journals.stmjournals.com/rrdms/article=2025/view=195479


References

  1. Basu, M., Prasad, B. (2009). The generalized relations among the code elements for Fibonacci coding theory. Chaos Solitons Fractals, 5 2517-2525.
  2. Dişkaya, O., Avaroğlu, E., Menken, H., and Emsal, A. (2022). A new Encryption Algorithm Based on Fibonacci Polynomials and Matrices. International Information and Engineering Technology Association, 39 (5), 1453-1462
  3. Uçar, S., Taş, N., and Özgür, N. H. (2019). A New Application to Coding Theory via Fibonacci and Lucas Numbers. Mathematical Sciences and Application E-Notes, 7 (1), 62-70.
  4. E., Kuloğlu, B., Özkan, E. (2024). An Encoding-Decoding Algorithm Based on Fermat and Mersenne Numbers, Applied Mathematics E-Notes, 24, 274-282
  5. Kuloğlu B., Özkan E. (2023). Creating Encryption and Decryption Algorithm Using Pell Numbers. EYFOR-14, Antalya, Türkiye, pp. 505.
  6. Kuloglu, B., Özkan, E. (2023). Applications of Jacobsthal and Jacobsthal-Lucas Numbers in Coding Theory, ¨ Mathematica Montisnigri, Lvii, 54–64.
  7. Van Bendegem JP. The Collatz conjecture. A case study in mathematical problem solving. Logic and Logical Philosophy. 2005 Jun 23;14(1):7-23.
  8. Kuloğlu, B. (2024). Creating a New Coding and Decoding Algorithm Based on Violin Notes, Research & Review: Discrete Mathematical Structure, 10 (3), 25-30.
  9. Wang F, Ding J, Dai Z, Peng Y. An application of mobile phone encryption based on Fibonacci structure of chaos. In2010 Second World Congress on Software Engineering 2010 Dec 19 (Vol. 2, pp. 97-100). IEEE.
  10. Tuncer T, Kurum HY. A novel Collatz conjecture-based digital image watermarking method. Cryptologia. 2022 Mar 4;46(2):128-47.

Ahead of Print Subscription Original Research
Volume
Received 19/12/2024
Accepted 06/01/2025
Published 10/01/2025


Login


My IP

PlumX Metrics