Proceedings of the 2nd International Conference on Security of Information and Networks - SIN '09 2009
DOI: 10.1145/1626195.1626237
|View full text |Cite
|
Sign up to set email alerts
|

Hill cipher modification based on eigenvalues HCM-EE

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 6 publications
0
14
0
Order By: Relevance
“…HCM-EE [14] works as follows. Sender A selects a set E = {e 1 , e 2 , ..., e m } ⊂ Z N − {0}, gcd(e j , N) = 1, gcd is the greatest common divisor, 1 ≤ j ≤ m; at least one e j should have the maximal order which is ϕ(N) 2 for N being a power of 2 [17], ϕ(N) is the Eulers totient function [5], giving the number of positive integers less than N and co-prime to it.…”
Section: Overview Of the Hill Cipher And Its Mmodificationsmentioning
confidence: 99%
See 2 more Smart Citations
“…HCM-EE [14] works as follows. Sender A selects a set E = {e 1 , e 2 , ..., e m } ⊂ Z N − {0}, gcd(e j , N) = 1, gcd is the greatest common divisor, 1 ≤ j ≤ m; at least one e j should have the maximal order which is ϕ(N) 2 for N being a power of 2 [17], ϕ(N) is the Eulers totient function [5], giving the number of positive integers less than N and co-prime to it.…”
Section: Overview Of the Hill Cipher And Its Mmodificationsmentioning
confidence: 99%
“…The proposed HCM-PRE uses the same encryption/decryption technique as HCM-EE [14] does. But HCM-PRE differs from the HCM-EE in the key construction.…”
Section: The Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…Instead, both sides use a pseudo-random permutation generator, and only the number of the necessary permutation is transferred to the receiver. It is shown in [7], [8] that both SHC and SHC-M fail to hide an image if it has large same colored areas. Another HC modification [5], HCM-H, also uses dynamic key matrix produced with the help of a one way hash function applied to an integer picked up randomly by the sender to get the key matrix, and a vector added to the product of the key matrix with a plain text.…”
Section: Introductionmentioning
confidence: 99%
“…Another HC modification [5], HCM-H, also uses dynamic key matrix produced with the help of a one way hash function applied to an integer picked up randomly by the sender to get the key matrix, and a vector added to the product of the key matrix with a plain text. It is shown in [7], [8] that HCM-H fails to hide an image if it has large same colored areas and it is vulnerable [9] to chosen-ciphertext attack because the selected random number is transmitted in clear over the communication link and is repeated.…”
Section: Introductionmentioning
confidence: 99%