A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key Cryptosystem

  • Suman Chandrasekhar S
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

In the present era of Information Technology, Transmission of information in a secured manner is the primary concern of all agencies. Security is highly essential, as intruders are very keen to rob the information with all their might and intelligence. Cryptography, then, not only protects data from theft or alteration, but can also be used for user authentication. The objective of this paper is to encrypt a text using a technique different from the conventional Hill Cipher. The Advanced Hill Cipher uses an involutory matrix and permuted key. In this paper, we implement a second level of encryption using permutation approach, which makes the cipher highly secure. This encryption scheme is highly reliable as it uses tamper detection of the cipher text ensuring successful decryption of the cipher. All of these functions and transformations that are introduced ensure that this cipher is a very strong one and it cannot be broken by any cryptanalytic attack.

Cite

CITATION STYLE

APA

Suman Chandrasekhar, S. C. (2013). A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key Cryptosystem. IOSR Journal of Computer Engineering, 11(2), 10–14. https://doi.org/10.9790/0661-1121014

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free