Please use this identifier to cite or link to this item: http://hdl.handle.net/2080/641
Full metadata record
DC FieldValueLanguage
dc.contributor.authorAcharya, B-
dc.contributor.authorRath, G S-
dc.contributor.authorPatra, S K-
dc.date.accessioned2008-03-15T03:33:41Z-
dc.date.available2008-03-15T03:33:41Z-
dc.date.issued2008-
dc.identifier.citationProceedings of the International Conference on Emerging Technologies and Applications in Engineering Technology and Sciences, Gujarat, 13-14 Jan 2008, P 126-130en
dc.identifier.urihttp://hdl.handle.net/2080/641-
dc.descriptionCopyright for the article belongs to proceedings publisheren
dc.description.abstractThe Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. However, a drawback of this algorithm is that the inverse of the matrix used for encrypting the plaintext does not always exist. So, if the matrix is not invertible, the encrypted text cannot be decrypted. This paper presents a variant of the Hill cipher that overcomes this disadvantage. The proposed technique adjusts the encryption key to form a different key for each block encryption. The proposed variant yields higher security compared to the original one. Also in this paper, a method of generating self-invertible matrix for Hill Cipher algorithm has been proposed. In the self-invertible matrix generation method, the matrix used for the encryption is itself self-invertible. So, at the time of decryption, we need not to find inverse of the matrix. Moreover, this method eliminates the computational complexity involved in finding inverse of the matrix while decryption.en
dc.format.extent166645 bytes-
dc.format.mimetypeapplication/pdf-
dc.language.isoen-
dc.subjectHill Cipheren
dc.subjectEncryptionen
dc.subjectDecryptionen
dc.subjectSelf Invertible Matrixen
dc.subjectModified Hill Cipheren
dc.titleNovel Modified Hill Cipher Algorithmen
dc.typeArticleen
Appears in Collections:Conference Papers

Files in This Item:
File Description SizeFormat 
bacharya-conf2-2008.pdf162.74 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.