A Trusted Model for Securing Shared Resources using Quaternionic Farey Fractions

Gayathri, V. and Thanamani, Antony Selvadoss (2009) A Trusted Model for Securing Shared Resources using Quaternionic Farey Fractions. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 9.0 (1). pp. 290-295. ISSN 1738-7906

Full text not available from this repository.

Abstract

A data is subjected to variety of attacks. Some attacks are passive in nature in that information is only monitored. Other attacks are active and information is altered with intent to corrupt or destroy the data or the network itself. In the absence of security schemes, both public and private networks are susceptible to unauthorized monitoring and access and can result in system downtime and public exposure to confidential information. At the same time theoretical development in information theory and computer science show promise of providing provably secure cryptosystem. In this context, the objective of this paper is to analyze and implement highly secure cryptography scheme using the properties of quaternion Farey fractions. A cryptography model that can provide high level of confusion and thereby create more diffusion (desirable effect) is proposed in this paper. Use of quaternions has been reported in computer graphics, control theory and signal processing. For example, spacecraft attitude control systems are reported to be commanded in terms of quaternion. The techniques proposed in this paper can help in increasing the accuracy and completeness of network topology discovery and can leverage existing protocol and hardware features, and also can be implemented easily.

Item Type: Article
Uncontrolled Keywords: Number theory, Computer network Security, Cryptography, resource management
Depositing User: Unnamed user with email techsupport@mosys.org
Last Modified: 06 Feb 2026 06:51
URI: https://ir.vmrfdu.edu.in/id/eprint/6140

Actions (login required)

View Item
View Item