Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/930
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Acharya, B | - |
dc.contributor.author | Jena, D | - |
dc.contributor.author | Patra, S K | - |
dc.contributor.author | Panda, G | - |
dc.date.accessioned | 2009-07-27T02:27:50Z | - |
dc.date.available | 2009-07-27T02:27:50Z | - |
dc.date.issued | 2009-01 | - |
dc.identifier.citation | Proceedings of International Conference on Advanced Computer Control, ICACC-09, Jan 22-24, 2009, Singapore, P 246-249 | en |
dc.identifier.isbn | 978-0-7695-3516-6/08 | - |
dc.identifier.uri | http://doi.ieeecomputersociety.org/10.1109/ICACC.2009.101 | - |
dc.identifier.uri | http://hdl.handle.net/2080/930 | - |
dc.description | Copyright belongs to Proceedings Publisher IEEE | en |
dc.description.abstract | Hill cipher's susceptibility to cryptanalysis has rendered it unusable in practice, it still serves an important pedagogical role in both cryptology and linear algebra. Hill cipher requires inverse of the key matrix while decryption. In fact that not all the matrices have an inverse and therefore they will not be eligible as key matrices in the Hill cipher scheme. Furthermore, due to its linear nature, the basic Hill cipher succumbs to known-plaintext attacks. In order to repair these flaws of the original Hill cipher, in this paper we proposed Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System. | en |
dc.format.extent | 337329 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | - |
dc.publisher | IEEE | en |
dc.subject | Hii Cipher | en |
dc.subject | Involutory Matrix | en |
dc.title | Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System | en |
dc.type | Article | en |
Appears in Collections: | Conference Papers |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Proceedings_2_ICACC_09.pdf | 329.42 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.