Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/641
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Acharya, B | - |
dc.contributor.author | Rath, G S | - |
dc.contributor.author | Patra, S K | - |
dc.date.accessioned | 2008-03-15T03:33:41Z | - |
dc.date.available | 2008-03-15T03:33:41Z | - |
dc.date.issued | 2008 | - |
dc.identifier.citation | Proceedings of the International Conference on Emerging Technologies and Applications in Engineering Technology and Sciences, Gujarat, 13-14 Jan 2008, P 126-130 | en |
dc.identifier.uri | http://hdl.handle.net/2080/641 | - |
dc.description | Copyright for the article belongs to proceedings publisher | en |
dc.description.abstract | The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a drawback of this algorithm is that the inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. This paper presents a variant of the Hill cipher that overcomes this disadvantage. The proposed technique adjusts the encryption key to form a different key for each block encryption. The proposed variant yields higher security compared to the original one. Also in this paper, a method of generating self-invertible matrix for Hill Cipher algorithm has been proposed. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption. | en |
dc.format.extent | 166645 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | - |
dc.subject | Hill Cipher | en |
dc.subject | Encryption | en |
dc.subject | Decryption | en |
dc.subject | Self Invertible Matrix | en |
dc.subject | Modified Hill Cipher | en |
dc.title | Novel Modified Hill Cipher Algorithm | en |
dc.type | Article | en |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
bacharya-conf2-2008.pdf | 162.74 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.