- Journal for the Mathematics Education and Teaching Practices
- Volume:5 Issue:1
- Enhancing digital security through randomized cryptology: a novel algorithm utilizing prime numbers,...
Enhancing digital security through randomized cryptology: a novel algorithm utilizing prime numbers, pi, linear encryption, and matrices
Authors : Neslihan Gül
Pages : 23-27
Doi:10.5281/zenodo.12612734
View : 26 | Download : 43
Publication Date : 2024-06-30
Article Type : Other Papers
Abstract :Recently, the widespread use of computer technology and the development of the internet have facilitated access to information. However, this has also increased the importance of information security. Public and private sector organizations need robust databases to protect their digital assets. For this reason, many security-oriented products and projects are being developed. Especially with the rapid progress of the internet age and the increasing importance of digital security, the field of cryptology has attracted great interest. Cryptology is the science of ciphers. The infrastructure of cryptology is based on mathematics. In order to ensure the security of information in the digital environment, a strong database is needed. This is achieved with strong encryption algorithms. Algorithms that incorporate the principle of randomness and allow repeating letters to take different values are stronger against external attacks. For these reasons, the aim of this study is to create a cryptology algorithm that is resistant to password cracking techniques, adopts the principle of randomness, contains mathematical formulas and has a decryption. In this study, prime numbers, pi number, linear encryption technique and matrices are used. In the encryption algorithm, it is aimed to adopt the principle of randomness with prime numbers and pi number. By using linear encryption technique and matrices, new sequence numbers of each letter were obtained, and it was aimed to strengthen against the frequency analysis method, which is one of the password cracking techniques, by ensuring that the repeating letters take different number values.Keywords : Cryptology, Digital security, Encryption, Information security