2011
DOI: 10.1002/sec.137
|View full text |Cite
|
Sign up to set email alerts
|

A secure cryptosystem based on affine transformation

Abstract: In this paper, it is proved that Lin et al.'s scheme that tried to strengthen the Hill cipher against the known-plaintext attack has several security flaws and is vulnerable to the chosen-ciphertext attack. This paper also introduces a secure and efficient symmetric cryptosystem based on affine transformation. The proposed cryptosystem includes an encryption algorithm that is an improved variant of the Affine Hill cipher, and two cryptographic protocols that are introduced for the proposed cryptosystem.devoted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2011
2011
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Toorani and Falahati introduce TFHC2 in [10], together with a two-pass protocol ("Protocol A") and a one-pass protocol ("Protocol B"). The core cipher is identical to TFHC1, except for the technique used to generate the a t value for each plaintext.…”
Section: Application Of Attack To Tfhc2mentioning
confidence: 99%
See 1 more Smart Citation
“…Toorani and Falahati introduce TFHC2 in [10], together with a two-pass protocol ("Protocol A") and a one-pass protocol ("Protocol B"). The core cipher is identical to TFHC1, except for the technique used to generate the a t value for each plaintext.…”
Section: Application Of Attack To Tfhc2mentioning
confidence: 99%
“…In 2009 and 2011, Toorani and Falahati introduced two variants of the Hill Cipher, together with protocols for the exchange of encrypted messages [9,10]. We refer to these ciphers as TooraniFalahati Hill Cipher #1 (2009) and #2 (2011), and we shorten the names to TFHC1 and TFHC2.…”
Section: Introductionmentioning
confidence: 99%
“…If it happens that this system is indeterminate, it is necessary to add a few more plaintext/ciphertext pairs. Fortunately, there are some researches on improving the security of Hill cipher . Security analysis of the scheme The security of the scheme depends on the data encryption key K , the secret key ks , and the verifiable tags, namely the confidentiality of the sum of the product of the file blocks.…”
Section: Security and Performance Analysismentioning
confidence: 99%
“…As Hill cipher is secure only to ciphertext attacks, the scheme is secure in this case. Moreover, there are some researches on improving the security of Hill cipher .…”
Section: Security and Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation