Modification in Hill Cipher for Cryptographic Application

To keep the information, secure from various contenders is an important factor for data security. For any organization, it is an incredibly important feature to timely transmit secured data. Optimized techniques for key management and protected encryption algorithms are always helpful for reducing t...

Full description

Saved in:
Bibliographic Details
Published in3C tecnología Vol. 8; no. 1; pp. 240 - 257
Main Authors Qazi, Farheen, Khan, Fozia Hanif, Agha, Dur–e–Shawar, Khan, Sadiq Ali, Rehman, Saqib ur
Format Journal Article
LanguageEnglish
Published 17.05.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:To keep the information, secure from various contenders is an important factor for data security. For any organization, it is an incredibly important feature to timely transmit secured data. Optimized techniques for key management and protected encryption algorithms are always helpful for reducing the overhead of the system and maintain the integrity, authentication and confidentiality of data. Cryptographic applications play an important role in our daily lives through sending emails, exchanging bank account transaction information, through mobile communication and through ATM card transaction. To secure our information from unauthorized users, Hill Cipher is one of the most well-known symmetric cryptosystems. For Hill Cipher, here we are proposed an algorithm for encryption and decryption which is based upon the transposition, substitution and left-right shift.
ISSN:2254-4143
2254-4143
DOI:10.17993/3ctecno.2019.specialissue2.240-257