**American Journal of Educational Research**

## Encryption Using Contractive Functions

**Asha Rani**^{1,}, **Kumari Jyoti**^{1}, **Naveen Kumar Antil**^{2}

^{1}Department of Mathematics, SRM University, Haryana, Sonepat- 131001, India

^{2}CITD, Rakuten India, Bangalore- 560054, India

Abstract | |

1. | Introduction |

2. | Preliminaries |

3. | The Proposed Scheme for Encryption |

4. | Algorithms |

5. | Advantages |

6. | Conclusion |

7. | Scope of the Study |

References |

### Abstract

In this paper we introduce a fresh encrypting strategy. Our encryption scheme is based on the concept of contractive functions in a Banach space. The algorithm uses two different concepts of mathematics: contraction principle, unique prime factorisation theorem. The mixture of these two concepts is beautiful and it promises a high level of security with an easy to learn mechanism.

**Keywords:** encryptions, contractive functions, banach contractive principle, unique factoriation theorem

**Copyright**© 2016 Science and Education Publishing. All Rights Reserved.

### Cite this article:

- Asha Rani, Kumari Jyoti, Naveen Kumar Antil. Encryption Using Contractive Functions.
*American Journal of Educational Research*. Vol. 4, No. 13, 2016, pp 931-936. http://pubs.sciepub.com/education/4/13/3

- Rani, Asha, Kumari Jyoti, and Naveen Kumar Antil. "Encryption Using Contractive Functions."
*American Journal of Educational Research*4.13 (2016): 931-936.

- Rani, A. , Jyoti, K. , & Antil, N. K. (2016). Encryption Using Contractive Functions.
*American Journal of Educational Research*,*4*(13), 931-936.

- Rani, Asha, Kumari Jyoti, and Naveen Kumar Antil. "Encryption Using Contractive Functions."
*American Journal of Educational Research*4, no. 13 (2016): 931-936.

Import into BibTeX | Import into EndNote | Import into RefMan | Import into RefWorks |

### 1. Introduction

The data that can be read and understood without any special measures is called a plaintext or cleartext. A method of disguising the plaintext in such a way that hides its substance is called an encryption. Encryption of a plaintext results into unreadable gibberish which is called ciphertext. We use encryption to ensure that information is hidden from anyone for whom it is not intended, even those who can see the encrypted data. The process of reverting ciphertext to its original plaintext is called decryption.

In past, many techniques have been used for encryption in order to maintain secrecy. Julius Ceaser used D in the place of A, E in place of B, and so on in his messages, only the person knowing the ‘shifting by three places’ hence can decode the messages^{[1]}. Augustus Ceaser used shifting by four places. By the time the computers came into existence and breaking ‘shifting by three or four places code’ was just a pen and paper work, so the need of more competent techniques grown. Then the generation of encryption by ASCII keys and other methods came into existence. As the time passed the encrypted data was not sent by directly. But it was still modified by some algorithms such as RSA, Rabin, Algamal, McEliece, Knapsack and Probabilistic public key transferring algorithms^{[2]}. All of these algorithms in the present literature are based on large prime numbers or on a part of number theory. None of the pioneers have concentrated on the functional analysis or metric spaces. We introduce an algorithm which is based on the concepts of contractive functions in Banach spaces, Banach contraction principle, fixed points and unique prime factorisation of a positive integer.

Here, we introduce a new technique of encryption which is based on Banach Contraction Principle of fixed point theory and Unique Factorisation theorem of number theory.

### 2. Preliminaries

**2.1. Definition [3]**

Let be a linear/ vector space over the field . A norm on is a mapping/ function from to ,

Satisfying the following three axioms:

(N1) [positivity]

(N2) for all and all [homogeneity]

(N3) for all [triangle inequality]

We call the pair , a normed space.

**2.2. Convergence to a Limit [3]**

Let be a norm on a vector space over . We say that a sequence of vectors in converges to a vector with respect to the norm , written as, , if for each , there exists a natural number , such that, whenever .

**2.3. Cauchy Sequence [3]**

The sequence in a normed space is called a Cauchy sequence if for every , there exists a positive integer , such that, whenever .

**2.4. Complete Normed Linear Space [3]**

is called a complete normed space if for every sequence in , such that, as there exists an element , such that, as .

**2.5. Definition (Banach Space) [3]**

A Banach space is a complete normed linear space.

**2.6. Theorem [3]**

In a Banach space, a sequence is convergent if and only if it is Cauchy.

**2.7. Theorem (Banach Fixed Point Theorem) [4]**

Let be a complete metric space in which the distance between two points and is denoted . And let be a contraction, i.e., there exists such that for all ,

Then, has a unique fixed point, i.e., there exists a unique such that .

### 3. The Proposed Scheme for Encryption

Each of the alphabet, integer or the special character is hereby associated with a contractive function whose fixed point is a prime number. One of such scheme is given as follows:

Now, after defining the codes of our encryption, we propose the algorithm for coding. The message will be encoded as two different numbers one which we get by getting the fixed point of the composition and one is the multiplication of the respective prime numbers.

### 4. Algorithms

**4.1. Algorithm for the Encryption**

1) Consider the characters used in the message as the functions as defined and the functions are connected as the compositions. i.e., “gauss” will be treated as “”.

2) Find out the fixed point of the function derived from step 1.

3) Now, again consider the characters in the message as corresponding prime numbers. i.e., “g=131, a=101, and so on”.

4) Multiply these primes to get a unique composite number.

5) The fixed point of step 2 and the composite number in step 4 are the required encryptions.

**4.2. Algorithm for the Decryption**

1) Factorize the composite number to get a unique prime factorisation.

2) Write down the corresponding characters to the prime numbers.

3) Now, to get the correct sequence of the characters locate the composite function having the fixed point encrypted.

4) The sequence of characters so derived is the required message.

**4.3. Example**

Let, the message to be sent is “one”. Then, first we find the composition function

with the fixed point .

Again, the composite number is . Now, our required encryption is: and .

Now, to decrypt the message again we first factorize the composite number, i.e., . Now, . But this can imply six combinations: viz, eno, eon, neo, noe, oen, one.

So, the one combination that has the same fixed point as per our encryption is “one”. And hence the given encryption is accurate as per the given conditions.

**4.4. Example**

Let, the message to be sent is “Gauss!”. Then, the composition function is

with the fixed point .

Again, the composite number is . Now, our required encryption is: and 3067291366147.

Now, to decrypt the message again we first factorize the composite number, i.e., . Now, . But, keeping G at first place and ! at the last place, we still have ways to arrange the message: Gauss!, Gasus!, Gassu!, Guass!, Gusas!, Gussa!, Gsaus!, Gsasu!, Gsuas!, Gsusa!, Gssua!, Gssau!

So, the one combination that has the same fixed point as per our encryption is “Gauss!”.

### 5. Advantages

The given algorithm is different from the routine encryptions. The routine encryptions decode the data as large integers. These encryptions cannot be sent as it is, since the data can be decrypted easily using different algorithm. For example one can first identify the most frequently occurring code and assume that to be the letter “a”, as “a” is the most frequently occurring alphabet. And then accordingly find out the white space and other tentative guesses. Hence, the codes can sometimes be even broken by pure guessing.

Now, even if by factorising the code one can guess that the prime with highest power is “a”, still the person does not know, where to place these “a”. Again, one can only guess that this letter is “a”, but the corresponding function cannot be known as there are many functions whose fixed point can be the given prime number.

In order to secure this routinely encrypted data one has to use one or the other public key algorithms, but the algorithm presented in this paper is self dependent to secure the data. However, the public key algorithms can be used to secure the data even to a higher degree.

### 6. Conclusion

The algorithm presented in the article is a new approach of encoding the secret messages, which contrary to the schemes present in the literature uses contractive functions and the concept of fixed point theorems. The algorithm is technically sound and is thoroughly verified for accuracy. This concept provides a new vision to the cryptography which till date relies only on the number theory for the security.

### 7. Scope of the Study

The paper discusses the algorithm in a banach space of real numbers. The same algorithm can be discussed in different spaces using appropriate properties of functions. The concept of prime numbers is used in the algorithm for which one has to take the whole set of real numbers. So if we find a substitution of prime numbers in the functions itself then on can even take the bounded spaces, like [0,1].

### References

[1] | W. Trappe, L.C. Washington, “Introduction to Cryptography with Coding Theory”, Pearson Education International, Prentice Hall (Second Edition). | ||

In article | |||

[2] | A. J. Menezes, P. C. van Oorschot, S. A. Vanstone “Handbook of Applied Cryptography”, CRC Press, 1996, 816 pages. | ||

In article | View Article | ||

[3] | S. Punnusamy, “Foundations of Functional Analysis”, CRC Press, 2002, 457 pages. | ||

In article | |||

[4] | Christiane Rousseau “Banach Fixed Point Theorem and Applications”, Universite de Montreal, 2010. | ||

In article | |||