2010
DOI: 10.7763/ijcte.2010.v2.244
|View full text |Cite
|
Sign up to set email alerts
|

A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side

Abstract: Abstract-In this paper, we have modified the Hill cipher by developing an iterative procedure consisting of three steps. In the first step, the plain text matrix is multiplied with the key matrix on one side and with its inverse on the other side. In the second step, the plain text matrix is mixed thoroughly by using a function called Mix ( ). In the last step, the plain text matrix is modified by using XOR operation between the plain text matrix and the key matrix. The cryptanalysis and the avalanche effect d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Symmetric cryptography technique are very efficient in practically than asymmetric cryptography technique, most security applications use symmetric cryptography to ensure the privacy/confidentiality, the integrity and the authenticity of sensitive/ secured data. Even most applications of such type cryptography are actually working in a hybrid manner by transmitting a cipher key with asymmetric techniques while symmetrically encrypting the payload data under the cipher key [5,6]. A cryptosystem is an algorithm or some predefine steps, which include all possible plaintexts/characters, cipher texts, and keys value.…”
Section: Introduction Overviewmentioning
confidence: 99%
“…Symmetric cryptography technique are very efficient in practically than asymmetric cryptography technique, most security applications use symmetric cryptography to ensure the privacy/confidentiality, the integrity and the authenticity of sensitive/ secured data. Even most applications of such type cryptography are actually working in a hybrid manner by transmitting a cipher key with asymmetric techniques while symmetrically encrypting the payload data under the cipher key [5,6]. A cryptosystem is an algorithm or some predefine steps, which include all possible plaintexts/characters, cipher texts, and keys value.…”
Section: Introduction Overviewmentioning
confidence: 99%