6 research outputs found

    Data Encryption and Decryption by Using Hill Cipher Algorithm

    Get PDF
    The core of Hill-cipher is matrix manipulations. It is a multi-letter cipher, for decryption the inverse of matrix requires and inverse of the matrix doesn’t always exist. Then if the matrix is not invertible then encrypted text cannot be decrypted. However, a drawback of this algorithm is overcome by use of self-repetitive matrix. This matrix if multiplied with itself for a given mod value (i.e. mod value of the matrix is taken after every multiplication) will eventually result in an identity matrix after N multiplications. So, after N+ 1 multiplication the matrix will repeat itself. Hence, it derives its name i.e. self-repetitive matrix. It should be non-singular square matrix. Key words: Hill Cipher Algorithm, Self-Repetitive Matrix and Inverse Matrix DOI: 10.7176/NCS/11-02 Publication date:July 31st 202

    Data Encryption and Decryption by Using Hill Cipher Algorithm

    Get PDF
    The core of Hill-cipher is matrix manipulations. It is a multi-letter cipher, for decryption the inverse of matrix requires and inverse of the matrix doesn’t always exist. Then if the matrix is not invertible then encrypted text cannot be decrypted. However, a drawback of this algorithm is overcome by use of self-repetitive matrix. This matrix if multiplied with itself for a given mod value (i.e. mod value of the matrix is taken after every multiplication) will eventually result in an identity matrix after N multiplications. So, after N+ 1 multiplication the matrix will repeat itself. Hence, it derives its name i.e. self-repetitive matrix. It should be non-singular square matrix. Keywords: Hill Cipher Algorithm, Self-Repetitive Matrix and Inverse Matrix DOI: 10.7176/CTI/10-01 Publication date:July 31st 202

    A Hybrid Approach for Data Hiding using Cryptography Schemes

    Get PDF
    Abstract -The use of internet increases for communication and for other more aspects. There are number of Cryptography scheme that used to increase security where we discuss about the confidential information transfer. As unauthorized access & data loss increases so, in this work we proposed a hybrid approach to hide secret data in other file that it can't be lost or accessed by unauthorized user. This hybrid technique can be proposed by using advance hill cipher and DES to enhance the security which can be measured by calculating PSNR & MSE values. This technique is a new technique for hiding text data behind the image file and increase the security

    EESCDE: An Energy Efficient SNR-Based Clustering With Data Encryption

    Get PDF
    In this decade, Under Water Sensor Network (UWSN) has become important in order to explore the underwater environment. The characteristics of UWSN such as limited energy, low bandwidth, high propagation delay, and error rate has made the design of clustering protocol challenging, due to the energy constrained sensor nodes. As the unpleasant environmental condition of the underwater, replacement of the battery is neither simple nor cheap. Therefore, energy saving is considered to be an important issue. A new clustering protocol is proposed which is named as energy ecient SNR based clustering in UWSN with Data Encryption (EESCDE). The residual energy of the nodes is considered for the improvement of the network lifetime of the sensor network. Using the proposed scheme, the improvement in the residual energy is achieved by reducing the number of transmission of the cluster head as well as the sensor nodes. The sensor nodes are partitioned into clusters and the cluster heads (CH) are chosen depending on the SNR values. Symmetric encipherment is implemented using the hill cipher to achieve the security of the sensed data.In Clustered-Underwater Wireless sensor networks (CUWSNs), battery operated sensing devices are grouped and connected with each other through wireless interfaces. Energy and processing eciency are the two important parameters in these systems. CUWSNs with reduced number of transmissions utilize less energy and prolong the lifetime of the network. A new protocol is proposed which is named as selective data transmission in SNR based cluster (SCSD). In this protocol, clustersare formed and the cluster heads (CH) are chosen depending on the SNR values.The number of transmissions of the cluster head and the sensor nodes are reducedby selectively transmitting the data. It also avoids congestion problem. This scheme has been implemented using NS3 and it is observed that the residual energy of the sensor nodes are improved by 10 percent.as compared to the algorithm, Efficient Secure Routing Protocol For SNR based Dynamic Cluster (ESRPSDC), and by 2 percent as compared to direct data transmission

    Implementing and Evaluating Nonsingular Matrices Generators for the Hill Cipher

    Get PDF
    A Cifra de Hill (Hill Cipher) é um exemplo clássico de um sistema criptográfico com propriedades muito interessantes, nomeadamente a implementação dos conceitos de confusão e difusão apresentados por Shannon como propriedades essenciais para as cifras; no entanto, a sua forma básica é vulnerável a Known Plaintext Attacks (KPAs). [...]Hill Cipher is a classical example of a cryptosystem with interesting properties, namely that it implements the diffusion and confusion concepts coined by Shannon as essential properties for ciphers; nonetheless, its basic form is vulnerable to KPAs. [...
    corecore