A New Method of Data Encryption based on One to One Functions

Osama R Shahin, Anis Ben Aissa, Yasser Fouad, Hassan Al-Mahdi, Mansi Alsmarah


Due to the rapid growth of computer networks, critical highly confidential information shared across these networks. Accordingly, securing such information from unauthorized intruders has become a vital issue in the field of information technology. In this paper, we present a new algorithm for encrypting and decrypting English plain text based on the well-known Caesar's algorithm and a special type of functions called One to One function. The proposed algorithm is referred to as the One to One function algorithm (OtO). The OtO belongs to a symmetric key concept where the same key is used in both encryption and decryption processes. In the OtO algorithm, the triplet (K, a, b) represent the private keys. To speed up the proposed OtO computation, the value of K is calculated based on Fibonacci sequence, on eigenvalues, Leslie matrices and Markov chain. This private key K only knew to the transmitter and receiver and considered one of the private keys used in the encryption process. When the message arrives at the receiver, it uses the inverse function of the proposed one to one function that used at the transmitter. The proposed OtO algorithm is conducted using MATLAB and its efficiency is checked in terms of encrypted time, decrypted time, and Avalanche Effect. We think that the obtained results are acceptable compared to famous algorithms DES, 3DES, AES and RSA. 


cryptography; symmetric encryption; fibonacci sequence; eigenvalues; one to one function.

Full Text:



S. Jain and V. Bhatnagar, "Analogy of various DNA based security algorithms using cryptography and steganography," (ICICT), 2014 International Conference on, pp 285–291, 2014.

J. Yang, J. Ma, S. Liu, and C. Zhang, "A molecular cryptography model based on structures of DNA self-assembly," Chinese science bulletin, vol 59, no. 11, pp. 1192–1198, 2014.

T. Larrieux, Aurelia. Technical Tools and Designs for Data Protection. In: Designing for Privacy and its Legal Framework. Springer, Cham, 2018. p. 101-148.

J. L. Philjon and N. Venkateshvara, "Metamorphic cryptography—a paradox between cryptography and steganography using dynamic encryption," (ICRTIT), 2011 International Conference on, pp. 217–222. IEEE, 2011.

M. E. Saleh, A. Aly, and F. Omara, “Data security using cryptography and steganography techniques,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol 7.no. 6, 2016.

H. Al-Mahdi, M. Alruily, O. Shahin, & K. Alkhaldi, “Design and Analysis of DNA Encryption and Decryption Technique based on Asymmetric Cryptography System. computing,” vol 10, no. 2, 2019.

K. Chen, "Cryptography. School of Informatics," University of Manchester. pp. 32, 2005.

B. Silva, J. Rodrigues, F. Canelo, M. Lopes, J. Lloret, “Towards a cooperative security system for mobile-health applications,”. Electronic Commerce Research, vol 19, no. 3, pp. 629-654, 2019.

R. Davis, “The Data Encryption Standard in Perspective,” Proceeding of Communication Society magazine, IEEE, vol. 16, Nov 1978.

R.L.Rivest, A.Shamir, L.Adleman, “A Method for obtaining Digital Signatures and Public-Key Cryptosystem,” Communication of the ACM, vol 21, Feb 1978.

P. Chandra Mandal “Superiority of Blowfish Algorithm,” International Journal of Advanced Research in Computers Science and Software Engineering, Vol 2, no. 9, 2012.

G. Singh, A. Kumar, K. S. Sandha, "A Study of New Trends in Blowfish Algorithm," International Journal of Engineering Research and Application. vol. 1, no. 2, pp.321-326, 2011.

J. W. Cornwell, G. A. Columbus, “Blowfish Survey,” Department of Computer Science. Columbus: GA Columbus State University, 2012.

A. Nadeem, M. Y. Javed "A Performance Comparison of Data Encryption Algorithms. In Information and communication technologies," (ICICT), First international conference on IEEE, 2005.

S. M. Seth, R. Mishra, "Comparative Analysis of Encryption Algorithms for Data Communication," 2011.

P. B. Jayant, N. C. Prashant, "Avalanche Effect of AES Algorithm." IJCSIT) International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3101-3103, 2014.

H. Al-Mahdi O. R. Shahin, Y. Fouad, K. Alkhaldi, “Design and analysis of DNA Binary Cryptography Algorithm for Plaintext,” International Journal of Engineering and Technology (IJET), vol. 10, no. 3 , pp. 699 -706, 2018 .

DOI: http://dx.doi.org/10.18517/ijaseit.10.3.10765


  • There are currently no refbacks.

Published by INSIGHT - Indonesian Society for Knowledge and Human Development