• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Text Encryption Using Pell Sequence and Elliptic Curves with Provable Security

    2022-08-23 02:17:52SumairaAzharNaveedAhmedAzamandUmarHayat
    Computers Materials&Continua 2022年6期

    Sumaira Azhar,Naveed Ahmed Azamand Umar Hayat

    1Department of Mathematics,Quaid-i-Azam University,Islamabad,45320,Pakistan

    2Department of Applied Mathematics and Physics,Graduate School of Informatics,Kyoto University,Kyoto,606-8501,Japan

    Abstract:The demand for data security schemes has increased with the significant advancement in the field of computation and communication networks.We propose a novel three-step text encryption scheme that has provable security against computation attacks such as key attack and statistical attack.The proposed scheme is based on the Pell sequence and elliptic curves,where at the first step the plain text is diffused to get a meaningless plain text by applying a cyclic shift on the symbol set.In the second step, we hide the elements of the diffused plain text from the attackers.For this purpose, we use the Pell sequence, a weight function, and a binary sequence to encode each element of the diffused plain text into real numbers.The encoded diffused plain text is then confused by generating permutations over elliptic curves in the third step.We show that the proposed scheme has provable security against key sensitivity attack and statistical attacks.Furthermore,the proposed scheme is secure against key spacing attack,ciphertext only attack,and known-plaintext attack.Compared to some of the existing text encryption schemes,the proposed scheme is highly secure against modern cryptanalysis.

    Keywords: Text encryption; pell numbers; elliptic curves; key sensitivity;statistical cryptanalysis

    1 Introduction

    There is a high demand for data security schemes due to the recent advancement in the fields of computation and communication technologies.Cryptography and steganography are the two main branches of data security schemes.Cryptography is the study of data security schemes where secret data is transformed into an unreadable data[1].Steganography is the study of data security schemes where secret data is embedded into host data so that the attackers cannot detect the existence of secret data[2].

    Different data security schemes have been proposed based on different mathematical structures such as elliptic curves [3–9], algebraic structures [10–15], chaotic maps [16–21] and fuzzy set theory[22,23].Security and privacy of the text messages are major concerns of the users while communicating on popular messaging platforms such as WhatsApp and Signal.So, the security of the text messages gained great attention now a days.We briefly review some of the recent text encryption schemes.Abdullah et al.[23] proposed a cryptosystem based on fuzzy logic where triangular fuzzy numbers are used to represent plain text and ciphertext.Gupta et al.[24] proposed a data security algorithm based on logical and shifting operations.Pattanayak et al.[25]used linear congruences and extended Euclidean algorithm to design a text encryption scheme.By utilizing 8-bit code values of alphabets, Agrawal et al.[26] proposed an efficient algorithm for text encryption.Ghrare et al.[27]designed a hidden encrypted symmetric key algorithm by hiding the secret key inside the ciphertext.Linear recurrences such as generalized Fibonacci numbers, Pell numbers and Pell-Lucas numbers have many applications in the field of mathematics and computer science [28–30].The schemes in[31–33] used linear recurrences for cryptography purpose.Luma et al.[31] explored a relationship between Fibonacci and Lucas sequence and used it for encryption and decryption purpose.Overmars et al.[32]proposed an efficient method to compute the golden ratio to avoid cryptographic breaches.Agarwal et al.[33]proposed a data encryption scheme based on Fibonacci numbers.Recently,DNA sequences are also used to generate secret keys for data security[34–36].Clelland et al.[34]combined a DNA based technique and the microdot to send messages secretly.Abbasy et al.[36] employed useful features of DNA sequences for data hiding.Chaotic maps are used to develop new security schemes due to their high sensitivity to the initial condition [37–42].Murillo-Escobar et al.[37]proposed a new text encryption scheme based on a logistic map.Similarly,elliptic curves(ECs)received great attention in the field of cryptography for image encryption [43–47], text encryption [48–53]and signcryption[54–56]due to comparable security against modern cryptanalysis with low key size.Sunneetha et al.[48] proposed a secure algorithm using elliptic curves and algebraic operations to transmit messages.Naji et al.[49]proposed a novel text encryption scheme by representing characters of the plain text with the affine points on an EC.Agrawal et al.[50] designed a text encryption method using ECC and Hill cipher with better security and complexity.Keerthi et al.[51]proposed a novel text encryption scheme where the hexadecimal form of the ASCII values of plain text are mapped to affine points of an ECs.Kumar et al.[52] used paired ASCII values corresponding to the plain text as an input for the elliptic curve.Singh and Singh developed an algorithm that can be used for encryption and decryption of any size of text message with given ASCII values.Ullah et al.[54]provided a critical review of hyper elliptic curves based signcryption algorithms.A hyper elliptic curve based signcryption scheme more suitable for emerging resource constraints environment is proposed by Ullah et al.[56].

    Most of the text encryption schemes available in the literature such as the schemes presented in[23–27,33,34,36,37,48–51,53]are not secure against well know attacks including key spacing,key sensitivity,statistical attack,ciphertext only attack and known-plaintext attack.The aim of this paper is to propose a novel text encryption scheme that has high security against modern cryptanalysis including key spacing, key sensitivity, statistical attack, ciphertext only attack and known-plaintext attack as compared to the existing text encryption schemes[23–27,33,34,36,37,48–51,53].The proposed scheme is based on the Pell sequence and elliptic curves and has three main steps,where we first diffuse the plain text.Then an encoding procedure is applied to the diffused plain text based on the Pell sequence in step 2.Finally,the encoded diffused plain text is confusedin step 3 based on ECs.The rest of the paper is organized as follows.Section 2 contains some preliminaries.We discuss a novel text encryption scheme in Section 3.Security analysis and a detailed comparison of the proposed scheme with the existing text encryption schemes[23–27,33,34,36,37,48–51,53]is discussed in Section 4.A conclusion is drawn in Section 5.

    2 Preliminaries

    2.1 Pell Sequence

    For initial valuesP0= 0 andP1= 1, then-th termPnof the Pell sequence is defined with the recurrence relation

    The first six terms of the Pell sequence are 0,1,2,5,12,and 29.By[30]it is known that fori→∞it holds that

    2.2 Elliptic Curves(EC)

    For a finite prime field Fpwith characteristic other than 2 and 3,primepand two integersa,b∈[0,p-1]such that 4a3+27b20(modp),the short Weiestrass form elliptic curveEp,a,bover the field Fpis the set

    whereδis the identity element of the EC.We call the integersp,aandbthe parameters of the ECEp,a,b.

    By [57], whena= 0 andp≡ 2(mod 3), the ECEp,a,bhas exactlyp+ 1 points with no repetition in their y-coordinates.Azam et al.[4]defined three orderings on an ECEp,a,bthat have good cryptographic properties.These orderings are natural ordering N,diffusion ordering D,and modulo diffusion ordering M such for any two points(x,y)and(x′,y′)on an ECEp,0,bit holds that

    The key features of these orderings are:(i)they diffuse the y-coordinates of the ordered EC;and(ii)the ordered ECs generated by these orderings are highly uncorrelated.Furthermore,it can be observed from Fig.1 that the three orderings are non-equivalent and are capable of generating randomness.Due to these properties,Azam et al.[4,5]showed that these orderings are cryptographically suitable for generating a large number of secure permutations over ECs.

    Figure 1:EC E29,0,1 and the effect of the natural,diffusion and modulo ordering on the EC E29,0,1:(a)Points of the EC E29,0,1 are shown w.r.t.non-decreasing x-coordinate from left to right;(b)y-coordinates of the points of the ordered EC E29,0,1 with natural ordering; (c) y-coordinates of the points of the ordered EC E29,0,1 with diffusion ordering;(d)y-coordinates of the points of the ordered EC E29,0,1 with modulo ordering

    3 The Proposed Scheme

    For an encryption scheme,it is essential to diffuse and confuse the plain text up to a certain level[2].Therefore,our scheme consists of three main steps where we first diffuse the plain text followed by an encoding procedure and then create confusion in the encoded diffused plain text.The diffusion step is performed by permuting the symbol set of the plain text.We use a restricted Pell sequence,a weight function,and a binary sequence to encode each element and its position in the diffused plain text with real numbers.Due to the sensitivity of the ECs over its parameters,we generate permutations over ECs to create confusion in the encoded diffused plain text.We discuss these three steps in detail below.

    LetSbe a finite symbol set of sizem,and fori∈[0,m-1],letS(i)denote thei-th element ofS.Suppose that the sender wants to send the plain textT=T(1)···T(i)···T(n)of lengthnwhich is a sequence overSwhereT(i),i∈[1,n]denotes thei-th element ofTandT(i)∈S.In this scheme,we encode plain text to real numbers in the interval[-1, 1]with at mostβ≥14 digits after the decimal.

    3.1 Encryption Procedure

    Step 1.Diffuse plain text:We select an integerk∈[0,m-1]and permute the entries ofSby using the permutationψk:S→Sdefined as

    i.e.,ψkmaps thei-th entry ofSon its(i+k) (modm)-th entry.Now generate a diffused plain textT′=T′(1)···T′(i)···T′(n)by using the permutationψksuch that thei-th elementT′(i)=ψk(T(i),i∈[1,n].The diffusion step is similar to the Caesar cipher[58].

    Step 2.Encode diffused plain text:To encode the elements of the diffused plain textT′,we generate a restricted Pell sequence,a weight function,and a binary sequence as follows.

    Select two positive integershandh′such thath <h′andh′-h+1 ≤β,and generate the restricted Pell sequenceQh,h′=q1···qi···qm,if it exists,such that for each integeri∈[1,m]the following hold:

    -qi= log(Pi/Pi-1)andqihas exactlyh′-h+1 digits fromh-th digit toh′-th digit after the decimal,wherePiis thei-th entry of the Pell sequence,and

    - all entries ofQh,h′are distinct, i.e., for any two distincti,j∈[1,m], it holds thatqiqj.We apply this condition so that each symbol in the diffused plain text can be encoded uniquely.

    Observe that the entries of the restricted Pell sequenceQh,h′are in the closed interval[0, 1]sincePi/Pi-1→1+(2)1/2asi→∞by[30].We added the constrainth′-h+1 ≤βto generate a restricted Pell sequence to control the length of the ciphertext and increase the key size,since for a fixed integerτ,there exists different pairsh,h′such thath′-h+1=τ,and hence different restricted Pell sequences.

    Generate aweight function w: {1,2,···,n} →[-1, 1] which is an injection, i.e., for any twoi,j∈ {1,2,···,n} such thatij, it holds thatw(i)w(j).The aim of this weight function is to uniquely encode the position of each element ofT′.

    Generate abinary sequence α=α1···αi···αn.Based on thei-th entryαiofα, decide if we use weightw(i)withqjorqj-1,j∈[1,n]during the encoding procedure.

    Now,generate an encoded diffused plain text(C,D)=(c1,d1)···(ci,di)···(cn,dn)such that thei-th elementT′(i)ofT′is encoded(ci,di)as with

    whereT(i)=S(j),for somej∈[1,m]andT′(i)=ψk(S(j))=S((j+k)(modm)).

    3.2 Ciphertext

    Transmit the confused sequenceσ(C)as a ciphertext of the plain textT.

    3.3 Secret Keys

    The integersh,h′andk,the weight functionwand the encoded sequenceσ′(D)are the secret keys of our encryption scheme.The integersh,h′andkare used to get the representation of symbols inS,the weight functionwis used to get the index of the symbols in the plain text,and the sequenceσ′(D)is used to getw.

    Note that for a givenβ,the proposed scheme can encrypt a plain text over a symbol setSwith size at most |Qh=1,h′=β|, i.e., for the proposed scheme it holds thatm≤|Qh=1,h′=β|.Furthermore, the proposed scheme can encrypt a plain textTof any arbitrary size,since it encodes each symbol ofTindividually.

    3.4 Decryption Procedure

    Assume that the channel between sender and receiver is noiseless, and therefore the receiver receives the ciphertextG=σ(c1)σ(c2)···σ(cn).Letgbe thel-th element ofG.We find the position ofgin the plain text by using the keysσ′(D)=σ′(d1)σ′(d2)···σ′(dn)and weight function as follows.Compute a reald∈σ′(D)such that

    for somer=w(i)∈[-1,1] withi∈[1,n].Observe that for eachgsuch a realdalways exists by Eq.(7).The integeriis the position of the element of the plain text corresponding to the elementgof the ciphertext.By using the secret keyh,compute the restricted Pell sequenceQh,h′and compute the inverse→Sdefined as

    of the permutation by using the secret keyk.To get the plain textT(i)at thei-th position of the plain textT,find the realqt∈Qh,h′such thatg=qt or d=1-qtfor some indext.Find the indextby using Tab.1,and finally get thei-th plain textT(i)asT(i)=corresponding to thel-th elementgofG.

    By repeating the above procedure for eachg∈G,we get the plain textT.The proposed encryption and decryption scheme is illustrated in Fig.2.

    Figure 2:Flowchart of the proposed encryption and decryption scheme

    We demonstrate our proposed encryption and decryption procedures in detail in Example 1.

    3.5 Example 1

    3.5.1 Encryption

    Let the ordered symbol setSbe the set of the capital English alphabet including blank-space and full-stop.This set is listed in the fourth column of Tab.1.Letβ=14,and forh=18 andh′=22,the entriesqiof the restricted Pell sequenceQh,h′are listed in the second column of Tab.1,while the third column of Tab.1 contains 1-qi.Select integerk= 6 to generate a permutationψk=6on the symbol setS.The entries ofψk=6are listed in the fifth column of Tab.1.

    Table 1:Entries S(i),ψk=6(S(i)),and qi of an ordered symbol set S,the permuted symbol set ψk=6(S),and the restricted pell sequence Qh =18, h′=22,respectively

    Suppose the sender wants to send the plain text T=STAY SAFE with nine elements.For each integeri∈[1,9],thei-th elementT(i)of the plain textT,thei-th elementT′(i)of the diffused plain text,weight valuew(i),binary valueαiandi-th element(ci,di)of the encoded plain text are listed in Tab.2.

    Table 2:Entries T(i), T′(i), w(i), αi and(ci,di)of a plain text T,diffused plain text T′,weight function w,binary sequence αi,and encoded diffused plain text(C,D),respectively

    To permute the encoded diffused plain text,we generated the ordered ECsE11,0,9andE11,0,4using natural and diffusion orderings respectively.The sequencesHandH′generated by these ordered ECs are listed in Tab.3.

    Table 3: Permutations due to the ordered ECs E11,0,9 and E11,0,4 with natural and diffusion ordering,respectively

    The confused encoded plain textσ(C)andσ′(D)are listed in Tab.4.

    Table 4: Entries of σ(ci)and σ′(di)of the confused plain text σ(C)and σ′(D),respectively

    Table 4:Continued

    3.5.2 Decryption

    We demonstrate the decryption procedure for the 5-th element g =σ(c5)= 0.45662 of the ciphertext G.Note thatg+d=r+ 1 holds ford=σ(d2)= 0.70638,r=w(i)= 0.163 withi= 6.This implies thatgis the(i=6)-th element of the plain text.The realqtfor which it holds thatg= 1-qthas indext= 3 in the third columnQh=18,h′=22of Tab.1.We get the(i=6)-th element=Sof the plain textTfrom the fourth column of Tab.1.

    4 Security Analysis and Comparison

    To analyze the security of the proposed scheme,we apply some well-known security tests including key spacing analysis,key sensitivity analysis,histogram test,information entropy analysis,ciphertext only attack and known-plaintext attack.We briefly explain these tests and their results for the proposed scheme in Sections 4.1–4.5.Furthermore,we give a detailed comparison of the security of the proposed scheme and some of the existing text encryption schemes in Section 4.6.

    4.1 Key Spacing Analysis

    Brute-force attack is commonly used by cryptanalysts to decrypt ciphertext.Key spacing analysis is used to analyze the security of an encryption scheme against brute-force attack.For an encryption scheme, key spacing is defined to be the number of distinct secret keys that it can generate.An encryption scheme is secure if its key spacing is at least 2100by [59].The proposed scheme has five secret keys, three integersk,h, andh′, a weight functionwand the sequenceσ′(D), where the keyσ′(D)depends onm,h,h′,k, andw, by Eq.(7).There aremchoices forkand(10β)nchoices forw,when the plain text is encoded to real numbers with at mostβ≥14 digits after the decimal andnis the size of the plain text.This implies that the key spacing of the proposed scheme is at leastm(10β)n >2100forn≥4,m≥1 andβ≥14.This implies that the proposed scheme satisfies key spacing analysis.In particular,when computation accuracy is 10-14,m= 5,β= 14 andn≥4,then there are 88 choices for selecting a pair of integershandh′such thath′-h+1 ≤βand there exists a restricted Pell sequence.This implies that the key spacing of the proposed scheme in this case is at least 5·88·(1014)4>2194.

    4.2 Key Sensitivity Analysis

    An encryption scheme is secure if it can generate a significantly different ciphertext for the same plaintext when the secret keys are slightly changed.In the next lemma,we show that for any plain text our scheme can generate a different ciphertext when any of the secret keysk,h,h′,andwis changed.

    Lemma 1.LetTbe a plain text of sizenover symbol setSof sizemandG=σ(c1)σ(c2)...σ(cn)be a ciphertext ofTthat is obtained by the proposed scheme using the secret keysk,h,h′and weight functionw.

    (i) The ciphertextG′generated by the proposed scheme by usingk′/k,k′∈[0,m-1],h,h′,andwis not equal toG.

    (ii) The ciphertextG′generated by the proposed scheme by usingk,th or t′h′that satisfies conditions of step 2,andwis not equal toG.

    (iii) Ifαi= 1,i∈[1,n],the ciphertextG′generated by the proposed scheme by usingk,h,h′,andw′such thatw′(i)w(i),for alli∈[1,n],is not equal toG.

    Proof.Let

    By Lemma 1, our scheme is highly sensitive to the secret keysk,h,h′, andw.We demonstrate Lemma 1 with an example by generating ciphertexts for the plain textT=STAY SAFE by slightly changing one key and fixing all other keys.The ciphertext fork= 6,h= 18,h′= 22, and weight functionwlisted in Tab.2,ordered MECE11,0,4with diffusion ordering is listed in the first column of Tab.5.The ciphertext generated by only changing the integerkto 7 following Lemma 1(i) is listed in the third column of Tab.5.The ciphertext generated by only changing integerh′to 23 following Lemma 1(ii)listed in the second column of Tab.5.The ciphertext generated by only changing weight function tow′(i)=w(i)+10-4following Lemma 1(iii) is listed in the fourth column of Tab.5.The ciphertext generated by only changing ECE11,0,5parameterbto 5 with diffusion ordering is listed in the fifth column of Tab.5.From Tab.5 it is evident that the ciphertext generated by slight changes in the secret keys are totally different.Hence,the proposed scheme satisfies the key sensitivity analysis.

    Table 5: Different ciphertexts generated by the proposed scheme for a fixed plain text

    Table 5:Continued

    4.3 Statistical Analysis

    An encryption scheme is highly secure against statistical attacks if it can generate a highly random ciphertext.Histogram analysis and entropy analysis are the two commonly used tests to analyze the security of a scheme against statistical attacks.A scheme is secure against statistical attacks if it can generate ciphertexts with uniform histogram and optimal entropy.

    LetXbe a data set over a symbol setΩand forω∈Ω,f(ω)denotes the frequency ofwinX.The entropyH(X)ofXis defined to be

    In the following result,we show that for each plain text,our scheme can generate a ciphertext with a uniform histogram and optimal entropy.

    Lemma 2.For any plaint text,there exists at least one weight function w such that the frequency of each element in the ciphertext generated by the proposed scheme is 1.

    By Lemma 2, it follows that for each plain text, the proposed scheme can generate a ciphertext with uniform histogram and optimal entropy by using the weight functionwconstructed in Lemma 2 andαi=1 for eachi.Hence the proposed scheme has provable security against statistical attacks.We demonstrate the claim in Lemma 2 in Tab.6 by generating a ciphertext for the plain textT=STAY SAFE with secret keysk= 6,h= 18,h′= 22,ordered ECsE11,0,4with diffusion ordering and weight functionwlisted in Tab.6.

    Table 6:A ciphertext generated by the proposed scheme with uniform histogram and optimal entropy

    4.4 Ciphertext Only Attack

    In ciphertext only attack, the cryptanalyst has access to some ciphertexts and try to get secret keys and hence the plain text.The cryptanalyst cannot reveal the plain text without the secret keys of the proposed scheme.Furthermore,there are at least 2100keys for a fixed plain text of size at least 4,as discussed in Section 4.1, and therefore the brute-force attack requires lots of time to decrypt the ciphertext without keys.Hence by[53]the proposed scheme is secure against ciphertext only attack.

    4.5 Known-plaintext Attack

    In this attack,the attacker knows a pair of plain text and ciphertext and tries to generate secret keys.In our scheme, the attacker tries to generateh,h′,k,wandσ(D′).The plain text consists of symbols inSand the ciphertext consists of real numbers with at mostβdigits after the decimal in our scheme,and therefore there is no relationship between the plain text and the keysh,h′,kandw.Recall thatw(i)∈[-1, 1],and therefore it is not necessary thath′-h+1 is at most the minimum number of digits after the decimal in the ciphertext.Thus, the attacker needs to try all possibilities forh,h′such thath′-h+1 ≤βand there exists a restricted Pell sequence of the size|S|,andkto know the representation of symbols inS,the weight functionwto know the index of the symbols in the plain text, andσ(D′)which depends on the latter keys.Furthermore, for a given plain text the proposed scheme can generate a completely different ciphertext when keys are changed,as discussed in Section 4.3.Hence the proposed scheme is highly secure against known-plaintext attack by[53].

    4.6 Security Comparison

    The proposed scheme has five secret keys,the three integersh,h′and k,the weight functionw,and the encoded sequenceσ′(D).The secret key depends onσ′(D)the choice ofh,h′,k,wand the plain text.The main purpose ofσ′(D)is to get the weight valuew(i), and hence the indexiwhenαi= 0.However, ifαi= 1 for alli, then the weightw(i)are in the ciphertext by Eq.(7), and therefore the keyσ′(D)is not necessary to get the weight function.More precisely,whenαi= 1 for alli,we solve Eq.(8)ford=1-qi,whereqi∈Qh,h′to getw.This implies that in the case ofαi=1 for alli,k,h,h′andware sufficient keys to decrypt a ciphertext.Note that these keys are independent of the plain text.Furthermore,the proposed scheme also satisfies the key spacing analysis,key sensitivity analysis,statistical analysis,ciphertext only attack and known-plaintext attack for the case ofαi=1 for allias discussed in Sections 4.1–4.5.

    We compared the security strength of the proposed scheme whenαi= 1 for alli, the case where all secret keys are independent of the plain text, and the schemes in [23–27,33,34,36,37,48–51,53] against key spacing attack, key sensitivity attack, statistical attack, ciphertext only attack and known-plaintext attack in Tab.7.We write “No” (resp.“NA”) in the second, fifth and sixth columns of Tab.7 if the corresponding scheme is not secure(resp.the analysis of the scheme against key spacing attack,ciphertext only attack and known-plaintext attack is not available.)Similarly,we write “No” in the third and fourth columns of Tab.7 if the corresponding scheme does not have provable security against key sensitivity attack and statistical attack.From Tab.7 observe that the security of the schemes in [23–27,33,34,36,37,48–51,53] is suspected against key spacing attack, key sensitivity attack, statistical attack, ciphertext only attack and known-plaintext attack.Therefore from Sections 4.1–4.5,the proposed scheme is more secure against listed attacks as compared to the schemes[23–27,33,34,36,37,48–51,53].

    Table 7: Security comparison of the proposed scheme with the existing schemes

    The schemes in [49] and [53] do not have provable security against key sensitivity attack and statistical attack.By Sections 4.2 and 4.3,the proposed scheme has high security against key sensitivity and statistical attacks as compared to the security of the schemes in[49]and[53].

    5 Conclusion

    We proposed a secure text encryption scheme.The scheme has three main steps, where we first diffuse the plain text by permuting the symbol set to convert the plain text into a meaningless message.In the second step,the diffused plain text is encoded with real numbers based on the Pell sequence,a weight function,and a binary sequence to hide the diffused plain text.In the third step,the scheme creates confusion in the encoded diffused plain text by generating permutations over ECs.We analyzed the security of the proposed scheme against several modern attacks including key spacing attack,key sensitivity attack,statistical attacks,ciphertext only attack and known-plaintext attack.From the analysis it is clear that the proposed scheme has high resistance against modern attacks.Furthermore,we compared the security strength of the proposed scheme with the existing text encryption schemes in[23–27,33,34,36,37,48–51,53].It is evident from the comparison that the proposed scheme is more secure as compared to the existing scheme against modern cryptanalysis.

    By this scheme,we gave an application of the Pell sequence and ordered ECs in cryptography.In this scheme, we used binary sequence and weight function, which can be generated by any available method.

    An interesting future direction would be to generate binary sequence and weight function by using ordered EC and propose an encryption scheme that can provide provable confidentiality and integrity.

    Funding Statement:This research is funded through JSPS KAKENHI Grant Number 18J23484,QAUURF 2015 and HEC project NRPU-7433.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    欧美精品人与动牲交sv欧美| 少妇丰满av| 国产精品女同一区二区软件| 亚洲无线观看免费| 亚洲av电影在线观看一区二区三区| 欧美日韩国产mv在线观看视频 | 国产黄片美女视频| 国产精品.久久久| 九色成人免费人妻av| 国产在视频线精品| 日韩欧美精品免费久久| 精品久久久噜噜| 欧美精品一区二区大全| 有码 亚洲区| 国产成人aa在线观看| 国产日韩欧美在线精品| 99热国产这里只有精品6| 国产精品久久久久成人av| 亚洲精品aⅴ在线观看| 午夜福利网站1000一区二区三区| 三级国产精品片| 免费黄频网站在线观看国产| 在线免费观看不下载黄p国产| 麻豆成人午夜福利视频| 国产伦精品一区二区三区四那| 亚洲精品,欧美精品| 人人妻人人添人人爽欧美一区卜 | 免费黄网站久久成人精品| 九草在线视频观看| 久久人人爽av亚洲精品天堂 | 一个人看视频在线观看www免费| 久久久久视频综合| 国产爽快片一区二区三区| 亚洲成人中文字幕在线播放| 亚洲精品日本国产第一区| 国产av码专区亚洲av| 欧美成人一区二区免费高清观看| 免费观看在线日韩| 国产精品女同一区二区软件| 女人久久www免费人成看片| 天美传媒精品一区二区| 性高湖久久久久久久久免费观看| 啦啦啦中文免费视频观看日本| 观看免费一级毛片| kizo精华| 亚洲欧美一区二区三区黑人 | 亚洲经典国产精华液单| 日韩av免费高清视频| 国产精品久久久久久精品古装| 中国国产av一级| 你懂的网址亚洲精品在线观看| 干丝袜人妻中文字幕| 国产精品秋霞免费鲁丝片| 免费少妇av软件| 舔av片在线| 国产成人午夜福利电影在线观看| 18禁裸乳无遮挡免费网站照片| 日韩欧美 国产精品| 亚洲av在线观看美女高潮| 国产精品免费大片| 亚洲,欧美,日韩| 91久久精品国产一区二区成人| 国产高潮美女av| 亚洲人成网站在线播| 国产亚洲91精品色在线| 国产探花极品一区二区| 热99国产精品久久久久久7| 亚洲成人中文字幕在线播放| 成人一区二区视频在线观看| av又黄又爽大尺度在线免费看| 乱系列少妇在线播放| 高清午夜精品一区二区三区| 激情五月婷婷亚洲| 在线观看一区二区三区激情| 九九久久精品国产亚洲av麻豆| 国产无遮挡羞羞视频在线观看| 熟女电影av网| 亚洲国产成人一精品久久久| 国模一区二区三区四区视频| 国产精品人妻久久久久久| www.色视频.com| 亚洲国产成人一精品久久久| 欧美日韩综合久久久久久| 最新中文字幕久久久久| 黄色欧美视频在线观看| 激情 狠狠 欧美| 99国产精品免费福利视频| av国产久精品久网站免费入址| 夜夜看夜夜爽夜夜摸| 国产精品国产三级国产专区5o| 男女下面进入的视频免费午夜| 欧美成人午夜免费资源| 视频区图区小说| 久久这里有精品视频免费| 夫妻午夜视频| 美女中出高潮动态图| 大片电影免费在线观看免费| 精品一区二区三卡| 日韩强制内射视频| 看十八女毛片水多多多| 人人妻人人添人人爽欧美一区卜 | 高清午夜精品一区二区三区| av国产久精品久网站免费入址| 国产免费一级a男人的天堂| 男人和女人高潮做爰伦理| xxx大片免费视频| 久久99精品国语久久久| 超碰av人人做人人爽久久| 国产有黄有色有爽视频| 18禁裸乳无遮挡免费网站照片| 日本av免费视频播放| 久久久久精品性色| 七月丁香在线播放| 伊人久久精品亚洲午夜| 妹子高潮喷水视频| 欧美日韩视频高清一区二区三区二| 熟女电影av网| 少妇精品久久久久久久| 国产人妻一区二区三区在| 狂野欧美激情性xxxx在线观看| 国产永久视频网站| 老司机影院毛片| 亚洲第一av免费看| 国产久久久一区二区三区| 我要看黄色一级片免费的| 一本色道久久久久久精品综合| 欧美日韩一区二区视频在线观看视频在线| 久久久久久人妻| 91在线精品国自产拍蜜月| 亚洲精品日韩av片在线观看| 午夜免费观看性视频| 黄色视频在线播放观看不卡| 一区二区av电影网| av.在线天堂| 精品一区二区三卡| 国产v大片淫在线免费观看| 久久99热这里只频精品6学生| 久久99热这里只有精品18| 性高湖久久久久久久久免费观看| 老女人水多毛片| 丝袜脚勾引网站| 在线观看国产h片| 免费高清在线观看视频在线观看| 国产伦在线观看视频一区| 亚洲精品第二区| 日本av免费视频播放| 欧美+日韩+精品| 国国产精品蜜臀av免费| 妹子高潮喷水视频| 一级片'在线观看视频| 亚洲精品久久久久久婷婷小说| 看免费成人av毛片| 亚洲精品一区蜜桃| 午夜老司机福利剧场| 成人国产av品久久久| 深夜a级毛片| 国产91av在线免费观看| 免费观看性生交大片5| 久久久亚洲精品成人影院| 亚洲精品一区蜜桃| av国产久精品久网站免费入址| 少妇人妻久久综合中文| 高清视频免费观看一区二区| 欧美xxxx黑人xx丫x性爽| 熟女电影av网| 久久久久久久亚洲中文字幕| 国产淫片久久久久久久久| 各种免费的搞黄视频| 国产成人精品久久久久久| 国产淫语在线视频| 久久99热6这里只有精品| 欧美日韩在线观看h| 亚洲av中文字字幕乱码综合| 日韩亚洲欧美综合| 日韩精品有码人妻一区| 99热6这里只有精品| 日韩制服骚丝袜av| 国产有黄有色有爽视频| 在线观看人妻少妇| 国产片特级美女逼逼视频| av在线蜜桃| 在线观看免费视频网站a站| 久久久久网色| 久久精品久久久久久噜噜老黄| 精品酒店卫生间| 中文字幕免费在线视频6| 国产综合精华液| 国产 一区精品| 黄色配什么色好看| 老女人水多毛片| 国内精品宾馆在线| 久久久精品94久久精品| 久久精品人妻少妇| 久热这里只有精品99| 建设人人有责人人尽责人人享有的 | 一个人免费看片子| 一本久久精品| 欧美性感艳星| 亚洲国产高清在线一区二区三| 新久久久久国产一级毛片| 简卡轻食公司| 国产精品久久久久久av不卡| 精品一区二区免费观看| 亚洲av中文av极速乱| 交换朋友夫妻互换小说| 高清午夜精品一区二区三区| 水蜜桃什么品种好| 国产男人的电影天堂91| 只有这里有精品99| 国产有黄有色有爽视频| 欧美人与善性xxx| 免费看日本二区| 日韩亚洲欧美综合| 久久久久人妻精品一区果冻| 观看av在线不卡| 成人毛片60女人毛片免费| 蜜桃在线观看..| 三级国产精品片| 卡戴珊不雅视频在线播放| 欧美另类一区| 高清日韩中文字幕在线| 亚洲精品,欧美精品| 人体艺术视频欧美日本| 一个人看视频在线观看www免费| videos熟女内射| 午夜激情福利司机影院| 最近手机中文字幕大全| 少妇猛男粗大的猛烈进出视频| 2018国产大陆天天弄谢| 街头女战士在线观看网站| 免费大片黄手机在线观看| 日日摸夜夜添夜夜爱| 久久人人爽人人爽人人片va| 亚洲精品久久久久久婷婷小说| 免费观看在线日韩| av天堂中文字幕网| 亚洲丝袜综合中文字幕| 新久久久久国产一级毛片| 少妇熟女欧美另类| 欧美成人一区二区免费高清观看| 综合色丁香网| 在线观看国产h片| 各种免费的搞黄视频| 国产成人91sexporn| 街头女战士在线观看网站| 欧美日韩一区二区视频在线观看视频在线| av在线老鸭窝| 亚洲精品456在线播放app| 男人和女人高潮做爰伦理| 久久国产亚洲av麻豆专区| 视频中文字幕在线观看| 欧美国产精品一级二级三级 | 久久久久性生活片| a级毛片免费高清观看在线播放| 久久精品国产自在天天线| 欧美精品一区二区大全| 国内少妇人妻偷人精品xxx网站| .国产精品久久| av专区在线播放| av线在线观看网站| 婷婷色综合www| 久久97久久精品| 深爱激情五月婷婷| 成人特级av手机在线观看| 我的女老师完整版在线观看| 日韩中字成人| 国产精品一区二区性色av| 制服丝袜香蕉在线| 国产白丝娇喘喷水9色精品| 亚洲国产精品国产精品| 国产v大片淫在线免费观看| 一级毛片 在线播放| 国产精品无大码| 少妇精品久久久久久久| 下体分泌物呈黄色| 在线免费十八禁| 一级黄片播放器| 免费黄网站久久成人精品| 免费少妇av软件| 久久这里有精品视频免费| 亚洲最大成人中文| 夜夜看夜夜爽夜夜摸| 欧美精品一区二区大全| 国产精品偷伦视频观看了| 国产成人91sexporn| 麻豆国产97在线/欧美| 人人妻人人添人人爽欧美一区卜 | 国产爱豆传媒在线观看| 欧美老熟妇乱子伦牲交| av黄色大香蕉| 亚洲成人一二三区av| 亚洲欧美日韩另类电影网站 | 久久精品久久精品一区二区三区| 黑人高潮一二区| 九九久久精品国产亚洲av麻豆| 欧美日韩一区二区视频在线观看视频在线| 久久久欧美国产精品| 欧美97在线视频| 热re99久久精品国产66热6| 如何舔出高潮| 超碰97精品在线观看| 国产精品99久久99久久久不卡 | 亚洲第一区二区三区不卡| 国产精品99久久久久久久久| 80岁老熟妇乱子伦牲交| 99久久精品一区二区三区| 男女无遮挡免费网站观看| 精品一品国产午夜福利视频| 精品一品国产午夜福利视频| 久热这里只有精品99| 亚洲精华国产精华液的使用体验| 80岁老熟妇乱子伦牲交| 欧美变态另类bdsm刘玥| 一级毛片aaaaaa免费看小| h视频一区二区三区| 伊人久久国产一区二区| 晚上一个人看的免费电影| 国精品久久久久久国模美| 在线观看国产h片| 天堂8中文在线网| 亚洲欧美日韩卡通动漫| 久久6这里有精品| 亚洲aⅴ乱码一区二区在线播放| 丰满少妇做爰视频| 人妻少妇偷人精品九色| 日韩一区二区三区影片| 超碰97精品在线观看| 热re99久久精品国产66热6| 亚洲国产成人一精品久久久| 国产精品久久久久久精品古装| 如何舔出高潮| 特大巨黑吊av在线直播| 久久精品国产鲁丝片午夜精品| 午夜精品国产一区二区电影| 中文字幕制服av| 丝袜脚勾引网站| 日本爱情动作片www.在线观看| 久久久久人妻精品一区果冻| av在线观看视频网站免费| 在线观看av片永久免费下载| 亚洲经典国产精华液单| av天堂中文字幕网| av在线蜜桃| 街头女战士在线观看网站| 久久精品久久久久久噜噜老黄| 黑人高潮一二区| 五月玫瑰六月丁香| 777米奇影视久久| 国产精品三级大全| 亚洲内射少妇av| 精品一区在线观看国产| 人人妻人人添人人爽欧美一区卜 | 久久国产乱子免费精品| 全区人妻精品视频| av网站免费在线观看视频| 亚洲激情五月婷婷啪啪| 亚洲熟女精品中文字幕| 国产精品成人在线| 午夜日本视频在线| 日本午夜av视频| 在线观看一区二区三区| 爱豆传媒免费全集在线观看| 九色成人免费人妻av| 久久影院123| 啦啦啦视频在线资源免费观看| 亚洲成人手机| 久久久精品94久久精品| 少妇裸体淫交视频免费看高清| 国产免费视频播放在线视频| 国国产精品蜜臀av免费| 国产亚洲欧美精品永久| 免费av中文字幕在线| 国产亚洲91精品色在线| 日韩av免费高清视频| 综合色丁香网| av国产精品久久久久影院| 最近中文字幕高清免费大全6| 午夜福利视频精品| 六月丁香七月| 欧美亚洲 丝袜 人妻 在线| 亚洲成人中文字幕在线播放| 国产91av在线免费观看| 国产91av在线免费观看| 国产 一区 欧美 日韩| 午夜视频国产福利| 精品亚洲乱码少妇综合久久| 午夜精品国产一区二区电影| 亚洲图色成人| 国产欧美日韩精品一区二区| 国产黄片美女视频| 婷婷色综合www| 黑人猛操日本美女一级片| 极品少妇高潮喷水抽搐| 少妇人妻久久综合中文| 涩涩av久久男人的天堂| 国产伦精品一区二区三区视频9| 超碰97精品在线观看| 亚洲精品自拍成人| 亚洲欧美一区二区三区国产| 国产高潮美女av| 毛片女人毛片| av在线蜜桃| 国内精品宾馆在线| 亚洲av日韩在线播放| 最近手机中文字幕大全| 欧美日韩一区二区视频在线观看视频在线| 少妇猛男粗大的猛烈进出视频| 麻豆成人av视频| 丰满迷人的少妇在线观看| 国产精品人妻久久久久久| 久久久精品94久久精品| 亚洲av中文字字幕乱码综合| 91久久精品国产一区二区三区| 久热这里只有精品99| 日本猛色少妇xxxxx猛交久久| 一级爰片在线观看| 亚洲自偷自拍三级| 美女中出高潮动态图| 国产亚洲91精品色在线| 在线观看免费视频网站a站| 日韩av免费高清视频| 成年女人在线观看亚洲视频| 高清av免费在线| 精品视频人人做人人爽| 国产亚洲午夜精品一区二区久久| 小蜜桃在线观看免费完整版高清| 97在线视频观看| 赤兔流量卡办理| 91久久精品国产一区二区三区| 80岁老熟妇乱子伦牲交| 久久久久人妻精品一区果冻| 人妻一区二区av| 少妇裸体淫交视频免费看高清| 伦精品一区二区三区| 视频中文字幕在线观看| 免费大片黄手机在线观看| 国产av国产精品国产| 亚洲中文av在线| 欧美精品人与动牲交sv欧美| 亚洲欧美精品专区久久| 美女主播在线视频| 久久久久久久久大av| 日本爱情动作片www.在线观看| 简卡轻食公司| 日韩 亚洲 欧美在线| 香蕉精品网在线| 香蕉精品网在线| 久久国产精品男人的天堂亚洲 | 高清黄色对白视频在线免费看 | 亚洲欧美日韩东京热| 婷婷色麻豆天堂久久| 国产亚洲欧美精品永久| 午夜福利高清视频| 国产片特级美女逼逼视频| 午夜福利高清视频| 国产69精品久久久久777片| 哪个播放器可以免费观看大片| 晚上一个人看的免费电影| 国产精品秋霞免费鲁丝片| 最近最新中文字幕大全电影3| 国产成人精品婷婷| 久久久欧美国产精品| 超碰av人人做人人爽久久| www.av在线官网国产| videossex国产| 大话2 男鬼变身卡| 久久精品国产亚洲网站| 看非洲黑人一级黄片| 欧美成人午夜免费资源| 国产精品国产三级国产av玫瑰| 亚洲人成网站高清观看| 男女国产视频网站| 人妻制服诱惑在线中文字幕| 一本久久精品| 91午夜精品亚洲一区二区三区| 热re99久久精品国产66热6| 少妇丰满av| 国产色爽女视频免费观看| 麻豆国产97在线/欧美| 中国美白少妇内射xxxbb| 高清不卡的av网站| 免费观看av网站的网址| 国产中年淑女户外野战色| 一区在线观看完整版| av黄色大香蕉| 亚洲欧洲日产国产| 日本黄色日本黄色录像| 日韩免费高清中文字幕av| 国产永久视频网站| 国产v大片淫在线免费观看| 国产成人91sexporn| 日韩电影二区| 黄色怎么调成土黄色| 看十八女毛片水多多多| 99久久精品国产国产毛片| 22中文网久久字幕| 国产无遮挡羞羞视频在线观看| 久久精品久久久久久噜噜老黄| 观看免费一级毛片| 搡老乐熟女国产| 性高湖久久久久久久久免费观看| av不卡在线播放| 日韩一本色道免费dvd| 嘟嘟电影网在线观看| 国产成人免费观看mmmm| 日韩一区二区视频免费看| 亚洲国产精品一区三区| 欧美最新免费一区二区三区| 国产老妇伦熟女老妇高清| 中文欧美无线码| 成年av动漫网址| 国产男人的电影天堂91| 日韩在线高清观看一区二区三区| 久久人人爽av亚洲精品天堂 | 中文字幕精品免费在线观看视频 | 少妇的逼水好多| 夫妻午夜视频| 熟女av电影| 日日摸夜夜添夜夜爱| 成人亚洲欧美一区二区av| 男人和女人高潮做爰伦理| 男女边摸边吃奶| 国产精品伦人一区二区| 亚洲国产精品专区欧美| 男女无遮挡免费网站观看| 中国国产av一级| 五月开心婷婷网| 性色avwww在线观看| 男的添女的下面高潮视频| 性色av一级| 国产伦精品一区二区三区视频9| 免费少妇av软件| 国产视频首页在线观看| 麻豆成人av视频| 嫩草影院入口| 国产乱人视频| 免费黄网站久久成人精品| 少妇的逼好多水| 亚洲最大成人中文| 女性被躁到高潮视频| 街头女战士在线观看网站| 尤物成人国产欧美一区二区三区| 丰满乱子伦码专区| 黄色一级大片看看| av女优亚洲男人天堂| 欧美日韩在线观看h| 丝袜喷水一区| 国产精品女同一区二区软件| 插逼视频在线观看| 亚洲精品成人av观看孕妇| 日本wwww免费看| 国产av一区二区精品久久 | 成人漫画全彩无遮挡| 伦精品一区二区三区| 日本欧美国产在线视频| 精华霜和精华液先用哪个| 国产成人精品一,二区| 欧美一区二区亚洲| 制服丝袜香蕉在线| 婷婷色av中文字幕| 久久人人爽人人爽人人片va| 免费看光身美女| 在线免费十八禁| 蜜臀久久99精品久久宅男| 91精品国产九色| 国产精品国产三级国产av玫瑰| 国产高清三级在线| 搡老乐熟女国产| 全区人妻精品视频| 蜜桃亚洲精品一区二区三区| 国产男女内射视频| 国产精品一区二区在线观看99| 国产美女午夜福利| 草草在线视频免费看| 在线播放无遮挡| 我要看黄色一级片免费的| 成人黄色视频免费在线看| 久久精品熟女亚洲av麻豆精品| 亚洲,一卡二卡三卡| 久久久亚洲精品成人影院| 尤物成人国产欧美一区二区三区| 偷拍熟女少妇极品色| 插逼视频在线观看| 性色av一级| 深夜a级毛片| 成人一区二区视频在线观看| 毛片一级片免费看久久久久| 亚洲真实伦在线观看| 一级爰片在线观看| 亚洲精品乱久久久久久| 久久久精品免费免费高清| 丰满少妇做爰视频| 深夜a级毛片| 精品人妻熟女av久视频| 五月伊人婷婷丁香| 少妇的逼水好多| 高清欧美精品videossex| 三级国产精品欧美在线观看| 国产亚洲一区二区精品| 亚洲精品色激情综合| 国产成人精品福利久久| 亚洲av电影在线观看一区二区三区| 一个人看视频在线观看www免费| 日韩亚洲欧美综合| 亚洲美女视频黄频| 一级av片app| 色婷婷av一区二区三区视频| 在线精品无人区一区二区三 | 国产伦精品一区二区三区四那| 丰满少妇做爰视频| 99re6热这里在线精品视频| 国产精品99久久99久久久不卡 | 亚洲精品亚洲一区二区| 国产精品伦人一区二区| 欧美另类一区|