This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
S. Nalini,
- Head & Assistant Professor, Department of Mathematics Arulmigu Arthanareeswarar Arts and Science College, Tamil Nadu, India
Abstract
Modern cryptographic systems rely on robust key generation to secure data and communication. This review explores the integration of difference equations and multi-precision arithmetic for cryptographic key generation, addressing limitations in traditional methods like pseudorandom number generators and chaotic systems. Difference equations produce deterministic yet chaotic sequences ideal for cryptography due to their sensitivity to initial conditions and nonlinearity. However, finite precision arithmetic can lead to periodicity and loss of randomness, compromising security. Multi-precision arithmetic overcomes these challenges by enabling computations with arbitrary precision, supporting the generation of extended, non-periodic sequences and expanding the cryptographic key space. This paper reviews the theoretical foundations of difference equations and their cryptographic relevance, examines multi-precision arithmetic’s role in enhancing sequence quality, and highlights research progress in combining these approaches. Key advancements include generating longer, high-entropy keys suitable for modern cryptographic needs, especially in resource-constrained environments like IoT and blockchain applications. The review identifies gaps, such as computational efficiency, scalability, and resistance to emerging threats, including quantum computing. It also proposes directions for future research, including adaptive parameter selection, hybrid systems, and enhanced randomness testing. This synthesis underscores the potential of difference equations and multi-precision arithmetic as a transformative approach to secure key generation, ensuring robust and scalable cryptographic solutions.
Keywords: Cryptographic key generation, Difference equations, Multi-precision arithmetic, Pseudorandom sequences, Chaotic systems, Nonlinear dynamics, Quantum-resistant cryptography
S. Nalini. Key Generation Algorithm Using Difference Equation With Multi -Precision – Arithmetic : A Review. Research & Reviews: Discrete Mathematical Structures. 2025; 11(03):-.
S. Nalini. Key Generation Algorithm Using Difference Equation With Multi -Precision – Arithmetic : A Review. Research & Reviews: Discrete Mathematical Structures. 2025; 11(03):-. Available from: https://journals.stmjournals.com/rrdms/article=2025/view=0
References
- Ameer, Huda. “Cryptographic Key Generation Using Fingerprint Biometrics.” University of Thi-Qar Journal of Science, vol. 5, no. 2, May 2015, pp. 75–80. DOI.org (Crossref), https://doi.org/10.32792/utq/utjsci/v5i2.125.
- Annaby, M. H., et al. “A Difference-Equation-Based Robust Image Encryption Scheme with Chaotic Permutations and Logic Gates.” Journal of Mathematical Imaging and Vision, vol. 64, no. 8, Oct. 2022, pp. 855–68. DOI.org (Crossref), https://doi.org/10.1007/s10851-022-01099-7.
- Assad, Safwan El, et al., editors. Cryptography and Its Applications in Information Security. MDPI – Multidisciplinary Digital Publishing Institute, 2022.
- Blum, Manuel, and Silvio Micali. “How to Generate Cryptographically Strong Sequences of Pseudorandom Bits.” SIAM Journal on Computing, vol. 13, no. 4, Nov. 1984, pp. 850–64. DOI.org (Crossref), https://doi.org/10.1137/0213053.
- Chen, Jianyong, “Enhanced Cryptography by Multiple Chaotic Dynamics.” Mathematical Problems in Engineering, edited by Ming Li, vol. 2011, no. 1, Jan. 2011, p. 938454. DOI.org (Crossref), https://doi.org/10.1155/2011/938454.
- Daisaka, Hiroshi, “GRAPE-MP: An SIMD Accelerator Board for Multi-Precision Arithmetic.” Procedia Computer Science, vol. 4, 2011, pp. 878–87. DOI.org (Crossref), https://doi.org/10.1016/j.procs.2011.04.093.
- Diffie, W., and M. Hellman. “New Directions in Cryptography.” IEEE Transactions on Information Theory, vol. 22, no. 6, Nov. 1976, pp. 644–54. DOI.org (Crossref), https://doi.org/10.1109/TIT.1976.1055638.
- Ditto, William, and Toshinori Munakata. “Principles and Applications of Chaotic Systems.” Communications of the ACM, vol. 38, no. 11, Nov. 1995, pp. 96–102. DOI.org (Crossref), https://doi.org/10.1145/219717.219797.
- G, Veena, and Ramakrishna M. “A Survey on Image Encryption Using Chaos-Based Techniques.” International Journal of Advanced Computer Science and Applications, vol. 12, no. 1, 2021. DOI.org (Crossref), https://doi.org/10.14569/IJACSA.2021.0120145.
- Golomb, Solomon , W. Shift Register Sequences. 1982. Rev. ed, Aegean Park Press.
- Hajomer, Adnan A. E., et al. “284.8-Mb/s Physical-Layer Cryptographic Key Generation and Distribution in Fiber Networks.” Journal of Lightwave Technology, vol. 39, no. 6, Mar. 2021, pp. 1595–601. DOI.org (Crossref), https://doi.org/10.1109/JLT.2020.3042906.
- Hutter, Michael, and Erich Wenger. “Fast Multi-Precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.” Journal of Cryptology, vol. 33, no. 4, Oct. 2020, pp. 1442–60. DOI.org (Crossref), https://doi.org/10.1007/s00145-020-09351-2.
- Knuth, Donald Ervin. The Art of Computer Programming. 3rd ed, Addison-Wesley, 1997.
- Kreinovich, Vladik, and Siegfried Rump. “Towards Optimal Use of Multi-Precision Arithmetic: A Remark.” Reliable Computing, vol. 12, no. 5, Oct. 2006, pp. 365–69. DOI.org (Crossref), https://doi.org/10.1007/s11155-006-9007-4.
- Kumar, Praveen, et al. “Image Encryption Algorithm-Based Reversible Data Hiding With Triple Des.” 2024 10th International Conference on Advanced Computing and Communication Systems (ICACCS), IEEE, 2024, pp. 1764–67. DOI.org (Crossref), https://doi.org/10.1109/ICACCS60874.2024.10717066.
- Ogiela, Marek R., and Hoon Ko. “Bio‐inspired and Cognitive Approaches in Cryptography and Security Applications.” Concurrency and Computation: Practice and Experience, vol. 30, no. 2, Jan. 2018, p. e4385. DOI.org (Crossref), https://doi.org/10.1002/cpe.4385.
- Padhye, Sahadeo, et al. Introduction to Cryptography. CRC Press, Taylor & Francis Group, 2018.
- Palacios-Luengas, Leonardo, et al. “Enhanced Chaotic Pseudorandom Number Generation Using Multiple Bernoulli Maps with Field Programmable Gate Array Optimizations.” Information, vol. 15, no. 11, Oct. 2024, p. 667. DOI.org (Crossref), https://doi.org/10.3390/info15110667.
- Pommerening, Klaus. “Cryptanalysis of Nonlinear Feedback Shift Registers.” Cryptologia, vol. 40, no. 4, July 2016, pp. 303–15. DOI.org (Crossref), https://doi.org/10.1080/01611194.2015.1055385.
- Rivest, R. L., et al. “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems.” Communications of the ACM, vol. 21, no. 2, Feb. 1978, pp. 120–26. DOI.org (Crossref), https://doi.org/10.1145/359340.359342.
- Saxena, S., and B. Kapoor. An Efficient Parallel Algorithm for Secured Data Communications Using RSA Public Key Cryptography Method,”, , India, 2014, Pp. 850-854, . Gurgaon, 2014, pp. 850–54, https://doi.org/10.1109/IAdCC.2014.6779433.
- Segall, R. S. “Some Mathematical and Computer Modelling of Neural Networks.” Applied Mathematical Modelling, vol. 19, no. 7, July 1995, pp. 386–99. DOI.org (Crossref), https://doi.org/10.1016/0307-904X(95)00021-B.
- Shyamsunder, S., and Ganesan Kaliyaperumal. “Image Encryption and Decryption Using Chaotic Maps and Modular Arithmetic.” American Journal of Signal Processing, vol. 1, no. 1, Aug. 2012, pp. 24–33. DOI.org (Crossref), https://doi.org/10.5923/j.ajsp.20110101.05.
- Silverman, Joseph H. Advanced Topics in the Arithmetic of Elliptic Curves. Springer New York, 1994. DOI.org (Crossref), https://doi.org/10.1007/978-1-4612-0851-8.
- St Denis, Tom, and Greg Rose. BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic. Syngress Pub, 2006.
- Stevic, Stevo, et al. “On a Higher-Order System of Difference Equations.” Electronic Journal of Qualitative Theory of Differential Equations, no. 47, 2013, pp. 1–18. DOI.org (Crossref), https://doi.org/10.14232/ejqtde.2013.1.47.
- Tatematsu, Akiyoshi, and Taku Noda. “A Method for Avoiding Numerical Instability in FDTD-Based Surge Simulations and Its Application to Representation of Thin Wires.” IEEJ Transactions on Power and Energy, vol. 129, no. 6, 2009, pp. 776–82. DOI.org (Crossref), https://doi.org/10.1541/ieejpes.129.776.
- Tew, Zheng Hong, et al. “Multi-Precision Integer Arithmetic Processing Using Arithmetic Circuit Homomorphic Encryption.” 2020 Asia Conference on Computers and Communications (ACCC), IEEE, 2020, pp. 104–08. DOI.org (Crossref),
- Vedika, B., and Abdul Quadir Md. “Cryptographic Techniques For Secure Key Management In Personnel Cloud.” Asian Journal of Pharmaceutical and Clinical Research, vol. 10, no. 13, Apr. 2017, p. 369. DOI.org (Crossref), https://doi.org/10.22159/ajpcr.2017.v10s1.19759.

Research & Reviews: Discrete Mathematical Structures
| Volume | 11 |
| 03 | |
| Received | 24/12/2024 |
| Accepted | 31/01/2024 |
| Published | 03/01/2025 |