Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/620
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAcharya, B-
dc.contributor.authorRath, G S-
dc.contributor.authorPatra, S K-
dc.contributor.authorPanigrahy, S K-
dc.date.accessioned2008-03-12T11:50:44Z-
dc.date.available2008-03-12T11:50:44Z-
dc.date.issued2007-
dc.identifier.citationInternational Journal of Security, Vol 1, Iss 1, P 14-21en
dc.identifier.urihttp://hdl.handle.net/2080/620 http://cssjournals.com/Journals/IJS/Volume1/Issue1/IJS-2.pdf-
dc.descriptionCopyright belongs to the journal publisheren
dc.description.abstractIn this paper, methods of generating self-invertible matrix for Hill Cipher algorithm have been proposed. The inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption.en
dc.format.extent91313 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.subjectHill Cipheren
dc.subjectEncryptionen
dc.subjectDecryptionen
dc.subjectSelf Invertible Matrixen
dc.titleNovel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithmen
dc.typeArticleen
Appears in Collections:Journal Articles

Files in This Item:
File Description SizeFormat 
6. Journal-IJS-07.pdf89.17 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.