DSpace@nitr >
National Institue of Technology- Rourkela >
Conference Papers >

Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/641

Full metadata record

DC FieldValueLanguage
contributor.authorAcharya, B-
contributor.authorRath, G S-
contributor.authorPatra, S K-
date.accessioned2008-03-15T03:33:41Z-
date.available2008-03-15T03:33:41Z-
date.issued2008-
identifier.citationProceedings of the International Conference on Emerging Technologies and Applications in Engineering Technology and Sciences, Gujarat, 13-14 Jan 2008, P 126-130en
identifier.urihttp://hdl.handle.net/2080/641-
descriptionCopyright for the article belongs to proceedings publisheren
description.abstractThe Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a drawback of this algorithm is that the inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. This paper presents a variant of the Hill cipher that overcomes this disadvantage. The proposed technique adjusts the encryption key to form a different key for each block encryption. The proposed variant yields higher security compared to the original one. Also in this paper, a method of generating self-invertible matrix for Hill Cipher algorithm has been proposed. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption.en
format.extent166645 bytes-
format.mimetypeapplication/pdf-
language.isoen-
subjectHill Cipheren
subjectEncryptionen
subjectDecryptionen
subjectSelf Invertible Matrixen
subjectModified Hill Cipheren
titleNovel Modified Hill Cipher Algorithmen
typeArticleen
Appears in Collections:Conference Papers

Files in This Item:

File Description SizeFormat
bacharya-conf2-2008.pdf162KbAdobe PDFView/Open

Show simple item record

All items in DSpace are protected by copyright, with all rights reserved.

 

Powered by DSpace Feedback