DATA ENCRYPTION AND DECRYPTION USING ANZL
ALGORITHM
Artan Luma and Nderim Zeqiri
CST, SEE University, Ilindenska bb, Tetovo, Macedonia
Keywords: Cryptography, Algorithm, Security, ANZL.
Abstract: What is the ANZL Algorithm? It is a genuine result of our work which is theoretically and practically
proved. By using the ANZL Algorithm, we can test whether a given number x belongs to Lucas’s series. It
can also be used to find a sequence of Lucas’s numbers, starting from any number x. If a given number x,
completes the relation 5·x
4λ
, we can say that it is a Lucas number and we mark it as L
x. From
the pair of numbers
L
,λ
, we can find the preceding L
and the succeeding L
e L
. Based on these
three elements of Lucas’s series, we can create the key for data encryption and decryption.
1 ALGORITHM ANZL
Based on Fibonacci series:
1, 1, 2, 3, 5, 8, 13, 21, 34, … (1)
We will be able to get the elements of Lucas’s series
using:
L
F
F
·
F
(2)
Where n, m N and m1,n2·m. If m, is
even, we use , if m, is odd, the we use . For
m1 and n3, we have:
L
F
F
F
1 (3)
For m2 and n5, we have:
L
F
F
F
3 (4)
For m3 and n7, we have:
L
F
F
F
4 (5)
For m4 and n9, we have:
L
F
F
F
7 (6)
For m5 and n11, we have:
L
F
F
F
11 (7)
Based on this general formula, using Fibonacci’s
numbers we will generate Lucas’s series of numbers:
1, 3, 4, 7, 11, 18, 29, … (8)
Theorem 1: For Lucas’s seires L
,nN, we have:
L
L
L
, n 1 (9)
Theorem 2: For odd members of Lucas’s series
L
, n N, we have:
L
·
·L
·
L
·
5 (10)
Theorem 3: For even members of Lucas’s series
L
,nN, we have:
L
·
·L
·
L
·
5 (11)
With the help of Theorems 2 and 3 we can find the
algorithm to test if a number belongs to Lucas’s
series or not.
L
·
·L
·
L
·
5 (12)
From Theorem 1, L
·
, we can write:
L
·
L
·
L
·
(13)
As a result:
L
·
L
·
L
·
(14)
If:
L
·
L
·
L
·
2·L
·
·L
·
L
·
(15)
L
·
L
·
L
·
2·L
·
·L
·
L
·
(16)
Now, the expression
L
·
L
·
, can be
written as:
L
·
L
·
L
·
L
·
4·L
·
·L
·
(17)
220
Luma A. and Zeqiri N. (2008).
DATA ENCRYPTION AND DECRYPTION USING ANZL ALGORITHM.
In Proceedings of the Tenth International Conference on Enterprise Information Systems - ISAS, pages 220-223
DOI: 10.5220/0001688102200223
Copyright
c
SciTePress