Modification in Hill Cipher for Cryptographic Application
To keep the information, secure from various contenders is an important factor for data security. For any organization, it is an incredibly important feature to timely transmit secured data. Optimized techniques for key management and protected encryption algorithms are always helpful for reducing t...
Saved in:
Published in | 3C tecnología Vol. 8; no. 1; pp. 240 - 257 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
17.05.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | To keep the information, secure from various contenders is an important factor for data security. For any organization, it is an incredibly important feature to timely transmit secured data. Optimized techniques for key management and protected encryption algorithms are always helpful for reducing the overhead of the system and maintain the integrity, authentication and confidentiality of data. Cryptographic applications play an important role in our daily lives through sending emails, exchanging bank account transaction information, through mobile communication and through ATM card transaction. To secure our information from unauthorized users, Hill Cipher is one of the most well-known symmetric cryptosystems. For Hill Cipher, here we are proposed an algorithm for encryption and decryption which is based upon the transposition, substitution and left-right shift. |
---|---|
ISSN: | 2254-4143 2254-4143 |
DOI: | 10.17993/3ctecno.2019.specialissue2.240-257 |