DSpace@nitr >
National Institue of Technology- Rourkela >
Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/1191

Title: H-S-X Cryptosystem and Its Application to Image Encryption
Authors: Achaya, B
Shukla, S K
Panigrahy, S K
Patra, S K
Panda, G
Keywords: Cryptosystem
Hill Cipher
Issue Date: Dec-2009
Publisher: IEEE CS
Citation: Proceedings of the International Conference on Advances in Computing, Control, and Telecommunication Technologies (ACT-2009), December 28-29, 2009, Trivandrum, India, P. 720-724
Series/Report no.: IEEE Proceedings;
Abstract: Abstract—Information security is an important issue. Today’s encryption technologies can be traced back to the earliest ciphers, and have grown as a result of evolution. The first ciphers were cracked, so new, stronger ciphers emerged. Code breakers set to work on these and eventually found flaws, forcing cryptographers to invent better ciphers and so on. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access. Hill cipher is a polygraph substitution cipher based on linear algebra. it was the first polygraph cipher which was practical to operate on more than three symbols at once, Hill Cipher has many advantages in data encryption. First, it is resistant to the frequency letter analysis. It's also very simple since it uses matrix multiplication. Finally, it has high speed and high throughput. However, noninvertible key matrix over Zm is the main disadvantage of Hill Cipher, because few of the matrices have inverses o...
Description: Copyright for the article belongs to proceedings publisher IEEE
URI: http://dx.doi.org/10.1109/ACT.2009.183
ISBN: 978-0-7695-3915-7
Appears in Collections:Conference Papers

Files in This Item:

File Description SizeFormat
HSX-ACT-2009.pdf418KbAdobe PDFView/Open

Show full item record

All items in DSpace are protected by copyright, with all rights reserved.


Powered by DSpace Feedback