Encryption and Decryption of the Data by Using the Terms of the Lucas Series
The sequence, whose initial condition is 2 and 1, obtained by summing the two terms preceding it, is called the Lucas sequence. The terms of this series continue as 2, 1, 3, 4, 7, 11, 18, 29, ... respectively. The features of the Lucas sequence have been studied in many projects in the literature an...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Düzce University
2021-05-01
|
| Series: | Düzce Üniversitesi Bilim ve Teknoloji Dergisi |
| Subjects: | |
| Online Access: | https://dergipark.org.tr/tr/download/article-file/1394919 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849309430033678336 |
|---|---|
| author | Mehmet Duman Merve Güney Duman |
| author_facet | Mehmet Duman Merve Güney Duman |
| author_sort | Mehmet Duman |
| collection | DOAJ |
| description | The sequence, whose initial condition is 2 and 1, obtained by summing the two terms preceding it, is called the Lucas sequence. The terms of this series continue as 2, 1, 3, 4, 7, 11, 18, 29, ... respectively. The features of the Lucas sequence have been studied in many projects in the literature and many studies have been done on Lucas series in applied sciences. Cryptology is the science that deals with encrypting data, transferring it securely from one point to another, and converting the encrypted data to the previous one. It includes cryptography and cryptoanalysis. Different encryption-decryption methods have been developed to ensure the security of the data from the past to the present. Some of these are Caesar, Affine, Vigenere and RSA. There are two types of encryption systems in cryptology. The first one is symmetric (secret key) encryption and the another one is asymmetric (public key) encryption. In this study; using the features of the Lucas sequence, studies on cryptology, which deals with the correct encryption, transfer and decryption of data, have been carried out and an example of cryptology algorithm has been given. With Lucas cipher, the letters in the alphabet and the space character are each mapped to the terms of the Lucas sequence. Later, starting from the first term of the Lucas sequence, the encryption was strengthened by adding Lucas terms. As a result, the text to be encrypted has been turned into a symbolic representation of the numbers. Then, the necessary information for deciphering the text which is encrypted with numbers is given. |
| format | Article |
| id | doaj-art-10e2cc95fa7e4da3b88268545a623a2b |
| institution | Kabale University |
| issn | 2148-2446 |
| language | English |
| publishDate | 2021-05-01 |
| publisher | Düzce University |
| record_format | Article |
| series | Düzce Üniversitesi Bilim ve Teknoloji Dergisi |
| spelling | doaj-art-10e2cc95fa7e4da3b88268545a623a2b2025-08-20T03:54:08ZengDüzce UniversityDüzce Üniversitesi Bilim ve Teknoloji Dergisi2148-24462021-05-01931710.29130/dubited.82531597Encryption and Decryption of the Data by Using the Terms of the Lucas SeriesMehmet Duman0https://orcid.org/0000-0002-0831-0172Merve Güney Duman1https://orcid.org/0000-0002-6340-4817DÜZCE ÜNİVERSİTESİAltınbaş UniversityThe sequence, whose initial condition is 2 and 1, obtained by summing the two terms preceding it, is called the Lucas sequence. The terms of this series continue as 2, 1, 3, 4, 7, 11, 18, 29, ... respectively. The features of the Lucas sequence have been studied in many projects in the literature and many studies have been done on Lucas series in applied sciences. Cryptology is the science that deals with encrypting data, transferring it securely from one point to another, and converting the encrypted data to the previous one. It includes cryptography and cryptoanalysis. Different encryption-decryption methods have been developed to ensure the security of the data from the past to the present. Some of these are Caesar, Affine, Vigenere and RSA. There are two types of encryption systems in cryptology. The first one is symmetric (secret key) encryption and the another one is asymmetric (public key) encryption. In this study; using the features of the Lucas sequence, studies on cryptology, which deals with the correct encryption, transfer and decryption of data, have been carried out and an example of cryptology algorithm has been given. With Lucas cipher, the letters in the alphabet and the space character are each mapped to the terms of the Lucas sequence. Later, starting from the first term of the Lucas sequence, the encryption was strengthened by adding Lucas terms. As a result, the text to be encrypted has been turned into a symbolic representation of the numbers. Then, the necessary information for deciphering the text which is encrypted with numbers is given.https://dergipark.org.tr/tr/download/article-file/1394919lucas sayılarıkriptolojibilgi güvenliğikriptografilucas numberscryptologyinformation securitycryptography |
| spellingShingle | Mehmet Duman Merve Güney Duman Encryption and Decryption of the Data by Using the Terms of the Lucas Series Düzce Üniversitesi Bilim ve Teknoloji Dergisi lucas sayıları kriptoloji bilgi güvenliği kriptografi lucas numbers cryptology information security cryptography |
| title | Encryption and Decryption of the Data by Using the Terms of the Lucas Series |
| title_full | Encryption and Decryption of the Data by Using the Terms of the Lucas Series |
| title_fullStr | Encryption and Decryption of the Data by Using the Terms of the Lucas Series |
| title_full_unstemmed | Encryption and Decryption of the Data by Using the Terms of the Lucas Series |
| title_short | Encryption and Decryption of the Data by Using the Terms of the Lucas Series |
| title_sort | encryption and decryption of the data by using the terms of the lucas series |
| topic | lucas sayıları kriptoloji bilgi güvenliği kriptografi lucas numbers cryptology information security cryptography |
| url | https://dergipark.org.tr/tr/download/article-file/1394919 |
| work_keys_str_mv | AT mehmetduman encryptionanddecryptionofthedatabyusingthetermsofthelucasseries AT merveguneyduman encryptionanddecryptionofthedatabyusingthetermsofthelucasseries |