2018
DOI: 10.5120/ijca2018916326
|View full text |Cite
|
Sign up to set email alerts
|

Parallel Hill Cipher Encryption Algorithm

Abstract: Cryptography is the discipline of encoding and decoding messages. Cryptography is used frequently in people's daily lives to keep sensitive information, such as credit card information, safe. Many everyday activities can be easily monitored by unintended third parties via Internet. Hill cipher is a classic cryptography based on linear algebra that is simply a linear transformation represented by a matrix. The encoding and decoding process in Hill cipher involves matrix multiplication, which is potentially time… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…The conventional cross-border money transfer process [16] As shown in the workflow of transferring money and in Fig. 1, the conventional money transfer way has the following three shortcomings:…”
Section: Figmentioning
confidence: 99%
See 1 more Smart Citation
“…The conventional cross-border money transfer process [16] As shown in the workflow of transferring money and in Fig. 1, the conventional money transfer way has the following three shortcomings:…”
Section: Figmentioning
confidence: 99%
“…BlockChain technology offers a way of recording transactions in a way that is designed to be secure, transparent, highly resistant to outages, auditable, and efficient [16] Consequently, a BC can be one of the solutions for addressing the security and privacy issues by providing: 1. A distributed and immutable system across a network.…”
Section: Latencymentioning
confidence: 99%
“…In fact, the research and exploration of USV are in progress in the field of unmanned technology, and ships floating on the sea will probably enter the unmanned era in the future. British Rolls Royce company (Luo Luo) is optimistic to this, as one of the [7] world's largest engine makers and shipbuilders who are determined to develop unmanned vehicles and offshore USV. There are slender difficulties in improving the unmanned craft at the technical level, and now there are many ships equipped with automatic equipment.…”
Section: Related Workmentioning
confidence: 99%
“…Encryption is always done on the sender side, while decryption is always done on the receiver side [27]. When an attacker attempts to gain access to data through a snatching mechanism, the attacker cannot misuse that data despite receiving data from a cloud server [28] if the attacker interrupts the sender and receiver communication and tries to snatch the data, as shown in Fig. 1.…”
Section: Introductionmentioning
confidence: 99%