An improved novel Hill cipher using RCLT Title of the article

  • Authors

    • V Hema
    • Dr M. Ganaga Durga
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.13888
  • Key generation, Encryption, Decryption, RNS, CRT.
  • Security is the only buoyant to the frailest link. In this communication world, the implementation of sturdy cryptographic and integrity checking algorithms is the smart solution to the frailest link. So, the proposed paper provides the new-fangled pattern of cryptographic scheme in concert with Number Theory which safeguard the integrity and confidentiality of intricate data and communications. By using this system, client’s burden of security issues associated with the data hosting in the untrusted remote server is abridged. By manipulating some features of the Galois Field, a new method of key generation is proposed. The proposed system is resilient against the various attacks and cannot be understood by the intruders. It is simple yet robust and will surely improve the overall security with higher efficiency.

     

  • References

    1. [1] L.S. Hill, “Cryptography in an Algebraic Alphabet,†American Mathematical Monthly, Vol.36, No.6, pp.306- 312, 1929.

      [2] I.A. Ismail, M. Amin, and H. Diab, “How to repair the Hill cipher,†Journal of Zhejiang University-Science A, Vol.7, No. 12, pp.2022-2030, Dec. 2006.

      [3] S. Saeednia, “How to Make the Hill Cipher Secure,†Cryptologia Journal, Vol.24, No.4, pp.353-360, Oct. 2000.

      [4] J. Overbey, W. Traves, and J. Wojdylo, “On the Keyspace of the Hill Cipher,†Cryptologia Journal, Vol.29, No.1, p.59–72, 2005.

      [5] K.H. Rosen, “Elementary Number Theory and Its Applications,†2nd Edition, Addison-Wesley, 1988.

      [6] D.E. Knuth, “The Art of Computer Programming,†Vol.2, Addison-Wesley, 1981.

      [7] Secure Hill cipher modifications and key exchange protocol ,Mahmoud, Ahmed Y.; Chefranov, Alexander G.; Automation Quality and Testing Robotics (AQTR), 2010 IEEE International Conference on Volume: 2 Digital Object Identifier.

      [8] A secure variant of the Hill Cipher, Toorani, M.; Falahati, A.; on, Digital Object Identifier: 10.1109/ISCC.2009.5202241, Publication Year: 2009.

      [9] Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System ,Acharya, B.; Jena, D.; Patra, S.K.; Panda, G.; Advanced Computer Control, 2009. ICACC '09. International Conference on, Digital Object Identifier: Publication Year: 2009. 6.

      [10] Prof. A.V.N.Krishna, K.Madhuravani, “A Modified Hill Cipher using Randomized Approachâ€, I. J. Computer Network and Information Security, June 2012.

      [11] B. Karthikeyan, Jagannathan Chakravarthy, Ramasubramanian S, “Amalgamation of Scanning paths and Modified Hill Cipher for Secure Steganographyâ€, Australian Journal of Basic and Applied Sciences, Volume 6(7), 2012.

      [12] Rahul. R. Ravan, Atul R. Nigavekar, “Secured Data Communication using Novel Modification to Hill Cipher Algorithm with Self Repetitive Matrixâ€, International Journal of Science and Research (IJSR), Volume 2, Issue 4, April 2013.

  • Downloads

  • How to Cite

    Hema, V., & M. Ganaga Durga, D. (2018). An improved novel Hill cipher using RCLT Title of the article. International Journal of Engineering & Technology, 7(2.33), 209-211. https://doi.org/10.14419/ijet.v7i2.33.13888