
 
-  Substitute bytes: This operation provides the 
non-linearity in the cipher. 
-  Shift rows and Mix columns provide diffusion in 
the cipher (i.e. making the relationship between 
plaintext and cipher text as complex as possible). 
 
As we have proven earlier in section 3, computing 
the logarithm of a complex exponential using two 
complex numbers is, under restrictions, a one-to-ma-
ny relation. This applies to plaintext binary represen-
tations and encrypted ones. In the aforementioned 
algorithm, chain encryption is used between 
 
and
1
, providing the “avalanche effect” mention-
ed earlier which increases the difficulty in cryptana-
lyzing a text encrypted with the above method.  
Our encryption method is probabilistic, meaning 
that a single plaintext can be encrypted to many pos-
sible cipher texts, without the consequence of size 
expansion between plaintext and cipher text, such as 
with the case of ElGamal (ElGamal, 1985). Perfect 
secrecy states that a cipher text leaks no information 
about the plaintext (to any, even an all-powerful ad-
versary). This is equivalent to stating that the proba-
bility that a given message maps to a given cipher 
text is exactly identical for every pair of messages 
and cipher texts (for randomly chosen keys) (Raghu-
nathan, 2011). The chain exponential encryption is 
depended on a random first complex number. This 
choice propagates to all exponential computations 
afterwards thus, if the first random complex is diffe-
rent each time, same plain texts encrypt to different 
cipher texts with no relation whatsoever.  
4.4  Efficiency and Computational 
Costs 
Knowing that logarithms of complex numbers can 
be reduced to elementary functions of real numbers 
for a specific branch as we presented earlier, the 
computational cost of this complex exponentiation 
step is the same as computing an elementary functi-
on of a real logarithm.  
Most algorithms compute elementary functions 
by composing arithmetic operations. Some known 
algorithms use Taylor series applicable to logarithm, 
with O ((log n) 2 M (n)) complexity (Chudnovsky et 
al., 1988). This shows that encryption and decrypti-
on algorithms for our method can be relatively fast 
with no excessive computational cost. On a sample 
encryption-decryption test we tested in our labs, 
simple transformations of a simple plaintext abide to 
the computational costs presented earlier (a simple 
plain text sentence was encrypted and decrypted in 
less than 0.1 sec (computer time) using open-source, 
ready-made complex number calculators). 
5 CONCLUSIONS 
We proposed a method for implementing a secret-
key cryptosystem using complex logarithms and an 
AES-like structure. Its security rests in part on the 
difficulty in computing chained functions of comp-
lex logarithms in specific open connected groups 
(logarithms computed using the notion of chain-
block encryption for the avalanche effect in the one-
to-many relations between complex logarithms and 
their exponentials).  
If the security of our method proves to be ade-
quate or our complex logarithm complex proves use-
ful in cryptosystems, it introduces a new concept in 
secure communications and also opens up alternati-
ves in creating robust key-schedules or more. In this 
case, the method could be utilized for hardening the 
protection of critical applications or infrastructures 
(Iliadis, 2000, Lekkas, 2006, Marias, 2007). 
Future work on the subject with involve real-
world encryptions on relatively big files and tho-
rough testing of the proposed cryptosystem on nu-
merous attacks, involving semantic analysis, known-
plaintext attacks etc. in order to prove its robustness. 
On top of that, the average computational complexi-
ty in cryptanalyzing cipher texts must be tested and 
proven true, either through reductions in Complexity 
Theory using similar, proven algorithms or through 
extended testing. 
ACKNOWLEDGEMENTS 
Authors would like to thank Dr. Nikos Sotiropoulos 
for his useful insight in complex analysis and the 
complex numbers. 
REFERENCES 
Biryukov, A., Khovratovich, D., Nikolić, I., 2009. Distin-
guisher and related-key attack on the full AES-256, 
Advances in Cryptology, pp. 231-249, Springer. 
Bogdanov A., Khovratovich D., Rechberger C., 2011. Bic-
lique Cryptanalysis of the Full AES, Advances in Cry-
ptology, Springer, 2011, p. 344-371. 
Chudnovsky, D., Chudnovsky, G. 1988. Approximations 
and complex multiplication according to Ramanujan. 
Ramanujan revisited, Academic Press. 
Daemen, J., Rijmen, V., 2003. AES Proposal: Rijndael, 
National Institute of Standards and Technology. 
Ehrsam W., Meyer C, Smith J., Tuchman W., 1976. Mes-
sage verification and transmission error detection by 
block chaining, US Patent 4074066. 
SECRYPT2013-InternationalConferenceonSecurityandCryptography
578