Next Article in Journal
Two-Dimensional Exact Subdomain Technique of Switched Reluctance Machines with Sinusoidal Current Excitation
Previous Article in Journal
An Analytical Expression for Magnet Shape Optimization in Surface-Mounted Permanent Magnet Machines
Article Menu
Issue 4 (December) cover image

Export Article

Open AccessArticle

An Efficient Golden Ratio Method for Secure Cryptographic Applications

School of Engineering, Construction & Design, Melbourne Polytechnic, Preston, VIC 3072, Australia
*
Author to whom correspondence should be addressed.
Math. Comput. Appl. 2018, 23(4), 58; https://doi.org/10.3390/mca23040058
Received: 17 September 2018 / Revised: 9 October 2018 / Accepted: 9 October 2018 / Published: 10 October 2018
  |  
PDF [1093 KB, uploaded 10 October 2018]
  |  

Abstract

With the increase in the use of electronic transactions in everyday life, secure communications and data storage to withstand any kind of attack is warranted. The golden ratio, being the most irrational among irrational numbers, can be used in elliptic curve cryptosystems, power analysis security, and other applications. However, in such applications, cryptographic operations should take place very quickly before the keys are extracted or decoded by the attackers. This paper proposes an efficient method of golden ratio computation in cryptography to resist information security breaches. We compare our new golden ratio method with the well-known Fibonacci sequence method. The experimental results show that our proposed method is more efficient than the Fibonacci sequence method. Our golden ratio method with infinite precision provides reliable counter measure strategy to address the escalating security attacks. View Full-Text
Keywords: golden ratio; Fibonacci sequence; Diophantine equation; cryptography; secret key; information security; efficient computation golden ratio; Fibonacci sequence; Diophantine equation; cryptography; secret key; information security; efficient computation
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Overmars, A.; Venkatraman, S. An Efficient Golden Ratio Method for Secure Cryptographic Applications. Math. Comput. Appl. 2018, 23, 58.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Math. Comput. Appl. EISSN 2297-8747 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top