6 research outputs found

    Implementing and Evaluating Nonsingular Matrices Generators for the Hill Cipher

    Get PDF
    A Cifra de Hill (Hill Cipher) é um exemplo clássico de um sistema criptográfico com propriedades muito interessantes, nomeadamente a implementação dos conceitos de confusão e difusão apresentados por Shannon como propriedades essenciais para as cifras; no entanto, a sua forma básica é vulnerável a Known Plaintext Attacks (KPAs). [...]Hill Cipher is a classical example of a cryptosystem with interesting properties, namely that it implements the diffusion and confusion concepts coined by Shannon as essential properties for ciphers; nonetheless, its basic form is vulnerable to KPAs. [...

    Healing the Hill Cipher, Improved Approach to Secure Modified Hill against Zero-plaintext Attack

    Get PDF
    Hill Cipher is a symmetric cryptosystem that was claimed to suffer from known-plaintext attack for many years. Different methods have been proposed to make this cipher more secure against known attacks. The introduced classic Hill cipher by Tourani and Falahati in 2011 that was devised in two variants and based upon affine transformation, was considered to be more secure against known attacks. Recently, this well modified Hill cipher is claimed to be vulnerable to zero-plaintext attack. In this paper, by using a chaotic map and scrambling methods, a novel cryptosystem based on Tourani and Falahati Hill cipher is presented which overcomes the zero-plaintext attack. The proposed Hill cipher is more reliable and faster

    A Hybrid Approach for Data Hiding using Cryptography Schemes

    Get PDF
    Abstract -The use of internet increases for communication and for other more aspects. There are number of Cryptography scheme that used to increase security where we discuss about the confidential information transfer. As unauthorized access & data loss increases so, in this work we proposed a hybrid approach to hide secret data in other file that it can't be lost or accessed by unauthorized user. This hybrid technique can be proposed by using advance hill cipher and DES to enhance the security which can be measured by calculating PSNR & MSE values. This technique is a new technique for hiding text data behind the image file and increase the security

    KRIPTANALISIS HILL CIPHER TERHADAP KNOWN PLAINTEXT ATTACK MENGGUNAKAN METODE DETERMINAN MATRIKS BERBASIS ANDROID

    Get PDF
    Saat ini teknik kriptografi Hill Cipher telah diimplementasikan untuk beberapa aplikasi. Dalam implementasinya ada saja kesalahan atau kecerobohan seperti kunci matriks yang digunakan pada proses enkripsi hilang karena tidak disimpan atau bahkan lupa. Oleh sebab itu diperlukan teknik kriptanalisis untuk mendapatkan kembali kunci yang hilang tersebut. Teknik kriptanalisis pada kriptografi Hill Cipher yang telah diketahui adalah dengan menggunakan persamaan linier dan menggunakan perkalian matriks. Pada persamaan linier, nilai dari masing-masing variabel matriks kunci dapat diketahui, namun proses pencarian nilai pada tiap variabel tersebut tidak dapat dilakukan dalam waktu yang singkat. Sedangkan pada perkalian matriks, proses pencarian variabel matriks kunci hanya dapat dilakukan jika matriks yang merepresentasikan plaintext memiliki invers atau nilai determinannya sama dengan satu. Nilai determinan yang didapatkan dari suatu matriks dapat dioperasikan untuk mencari nilai suatu variabel dari operasi aljabar linear yang telah direpresentasikan kedalam bentuk matriks. Masing-masing variabel tersebut dapat melakukan proses pencarian determinan secara bersamaan. Dalam penelitian ini penulis akan mengembangkan suatu sistem untuk mencari nilai pada variabel matriks kunci berdasarkan perhitungan determinan matriks yang dikembangkan menggunakan paradigma System Development Life Cycle (SDLC) Waterfall dan diimplementasikan pada sistem operasi berbasis Android

    EESCDE: An Energy Efficient SNR-Based Clustering With Data Encryption

    Get PDF
    In this decade, Under Water Sensor Network (UWSN) has become important in order to explore the underwater environment. The characteristics of UWSN such as limited energy, low bandwidth, high propagation delay, and error rate has made the design of clustering protocol challenging, due to the energy constrained sensor nodes. As the unpleasant environmental condition of the underwater, replacement of the battery is neither simple nor cheap. Therefore, energy saving is considered to be an important issue. A new clustering protocol is proposed which is named as energy ecient SNR based clustering in UWSN with Data Encryption (EESCDE). The residual energy of the nodes is considered for the improvement of the network lifetime of the sensor network. Using the proposed scheme, the improvement in the residual energy is achieved by reducing the number of transmission of the cluster head as well as the sensor nodes. The sensor nodes are partitioned into clusters and the cluster heads (CH) are chosen depending on the SNR values. Symmetric encipherment is implemented using the hill cipher to achieve the security of the sensed data.In Clustered-Underwater Wireless sensor networks (CUWSNs), battery operated sensing devices are grouped and connected with each other through wireless interfaces. Energy and processing eciency are the two important parameters in these systems. CUWSNs with reduced number of transmissions utilize less energy and prolong the lifetime of the network. A new protocol is proposed which is named as selective data transmission in SNR based cluster (SCSD). In this protocol, clustersare formed and the cluster heads (CH) are chosen depending on the SNR values.The number of transmissions of the cluster head and the sensor nodes are reducedby selectively transmitting the data. It also avoids congestion problem. This scheme has been implemented using NS3 and it is observed that the residual energy of the sensor nodes are improved by 10 percent.as compared to the algorithm, Efficient Secure Routing Protocol For SNR based Dynamic Cluster (ESRPSDC), and by 2 percent as compared to direct data transmission

    Cryptanalysis of the Toorani-Falahati Hill Ciphers

    No full text
    corecore