Securing data using 4 variables linear block cipher Asymmetric key Algorithm
Journal: INTERNATIONAL JOURNAL OF COMPUTERS & DISTRIBUTED SYSTEMS (Vol.1, No. 3)Publication Date: 2012-10-15
Authors : Prakash Kuppuswamy;
Page : 103-112
Keywords : Adjoint Matrix; Determination Matrix; Inverse; Modulation; Linear block; Private key or symmetric key; Public Key or Asymmetric key; Square Matrix; Synthetic Value; Transpose Matrix.;
Abstract
Many cryptographic algorithms used for ensuring security. But still has got several security breaches that need to be dealt with. An improvement over this has been implemented in this paper. Internet connection and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. This paper deals with a new algorithm using modulation of 37 and? 4 x 4 linear matrix. Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. This paper deals with a new algorithm using negative numbers based on linear matrix. It is time efficient and easily learns useful concept and skills. Our goal is to build upon the new Asymmetric key algorithm using linear block cipher or Hill cipher encryption codes of an existing method and design a set of simulation and emulation. Encryption works by running the data (represented as numbers) through a new encryption formula using only negative number using linear matrix and negative value of ‘e’ value.? All the encryption based on the Alphabets and numbers, Here, we are assigning synthetic data value to the alphabets and 0-9 numerals. Encryption as cipher text using invertible square matrix, block the message into 4x4 matrix and select ‘e’ any natural number or any negative and multiply with selected matrix and message and use modulation 37, then remainder is our cipher text or encrypted message. Hence for which we got a factor which is then transmitted, and then at decryption using invert of the square matrix and inverse of e value i.e called as d and multiply with received message and used modulation 37, remainder is our plain Text or message. The decryption algorithm will be there for the receiver as the private key is known as invertible of matrix i.e k-1 .
Other Latest Articles
- Signature Analysis based Character Recognition Approach
- Image Preprocessing Methods in Image Recognition
- An Identity-Based Security for Nodes in EAD File Replication in P2P Systems
- GSLDA- BASED FACE DETECTION
- Implementation of Anomaly based Intrusion Detection and Prevention system using Zero Knowledge Protocol In Wireless Sensor Network
Last modified: 2016-07-02 19:35:59