Key generations model for mobile cryptosystems

0Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper we proposed cryptosystem for mobile applications as Short Message Service (SMS) based on block cipher and Hill cipher methods. Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill Cipher algorithm which is classified as symmetric encryption. In this paper we provide a solution for the problem of non-invertible matrix by modifying the way of dealing with key matrix, and make all matrices; including non- invertible ones, usable in modified Hill cipher system. Moreover, it will solve the known of pair plaintext and cipher text problem by generating new key matrix for each encrypted block of plaintext, using SHA-512. Since SHA-512 generates 64 integers we can manipulate these integers to become 128 different integers and use them as an input for the matrix; based on the concept that any acceptable data must not be prime. © 2013 Springer Science+Business Media.

Cite

CITATION STYLE

APA

Hamamreh, R. (2013). Key generations model for mobile cryptosystems. In Lecture Notes in Electrical Engineering (Vol. 152 LNEE, pp. 215–225). https://doi.org/10.1007/978-1-4614-3535-8_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free