Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Bibhudendra Acharya, Girija Sankar Rath, Sarat Kumar Patra, Saroj Kumar Panigrahy
Pages - 14 - 21 | Revised - 15-06-2007 | Published - 30-06-2007
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Hill Cipher, Encryption, Decryption, Self-invertible matrix.
ABSTRACT
In this paper, methods of generating self-invertible matrix for Hill Cipher algorithm
have been proposed. The inverse of the matrix used for encrypting the plaintext
does not always exist. So, if the matrix is not invertible, the encrypted text cannot
be decrypted. In the self-invertible matrix generation method, the matrix used for
the encryption is itself self-invertible. So, at the time of decryption, we need not to
find inverse of the matrix. Moreover, this method eliminates the computational
complexity involved in finding inverse of the matrix while decryption.
1 | Kumar, D. N. S., & Prabhakar, K. New Image Security Method based on Hill-Cipher. |
2 | kamenchenko, s. recursive involutory matrix generation algorithm, which is based only with elements±1 and±2. |
3 | Kumar, L. R., Prakash, P. R., Gopal, G. V., Dharani, D. L., & Rao, B. S. Watermark based Substitution technique Hill Cipher applied on Images. |
4 | Chhotaray, S. K., Chhotaray, A., & Rath, G. S. A new method of generating public key matrix and using it for image encryption. |
5 | Adil, A. R. (2015). Text Steganography to Border Image Using Novel Method. Applied Mathematical Sciences, 9(62), 3087-3096. |
6 | Joshi, A., & Kumari, M. Encryption of RGB image using Arnold transform and involutory matrices. |
7 | Panduranga, H. T. (2015). Development of image encryption and partial image encryption algorithms. |
8 | Debnath, D., Deb, S., & Kar, N. (2015, January). An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 178-183). IEEE. |
9 | Sharma, A. K., & Sharma, H. (2015).New approach to des with enhanced key management and encryption/decryption system (des ultimate). International Journal of Advances in Engineering & Technology, 8(3), 368. |
10 | Selvi, A. K., & Sathik, M. M. (2015). Efficiency Analysis and Security Evaluation of Block based Image Encryption Schemes. Digital Image Processing, 7(1), 29-32. |
11 | Supiyanto, S. (2015, December). Implementasi hill cipher pada citra menggunakan koefisien binomial sebagai matriks kunci. In Seminar Nasional Informatika (SEMNASIF) (Vol. 1, No. 1). |
12 | Naveenkumar, S. K., & Panduranga, H. T. (2015, March). Chaos and Hill Cipher Based Image Encryption for Mammography Images. In Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on (pp. 1-5). IEEE. |
13 | Amounas, F., & El Kinani, E. H. Security Enhancement of Image Encryption Based on Matrix Approach using Elliptic Curve. |
14 | Sastry, V. U. K., & Samson, C. A Modern advanced hill cipher including a pair of involutory matrices as multiplicands and involving a set of functions. A= A, 1, 2-1. |
15 | AN, R. (2014). An Adaptive Dual Image Encryption: A Review. |
16 | Selvi, A. K., & Sathik, M. M. (2014). Performance Evaluation of Block based Image Encryption Algorithms. Digital Image Processing, 6(8), 342-345. |
17 | SelvaKumar, T. N. D. A. L. (2014). Encryption using lester hill cipher algorithm. |
18 | MIET, M. I. Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting. |
19 | Chhotaray, S. K., Majhi, J., & Rath, G. S. (2013). Encryption by Hill cipher and by a novel method using Chinese remainder theorem in Galois field. International Journal of Signal and Imaging Systems Engineering, 6(1), 38-45. |
20 | Soyjaudah, K. S., & KA, S. D. (2013). Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method. International Journal of Computer Applications, 63(21). |
21 | Samson, C., & Sastry, V. U. K. (2013). Encryption of a Gray level Image and a Color Image by Using a Key Bunch Matrix. nternational Journal of Advanced Computing, ISSN, 2051-0845. |
22 | Bhansali, A., HiralBarot, K., Shah, S., & Chheda, V. (2013). Encrypting Watermarked Images: A Transparent Approach. International Journal of Future Computer and Communication, 2(6), 665. |
23 | Emmanuel, W. S., & Singh, C. E. J. (2013).Digital color image encryption based on invertible matrix with secret sharing. ICTACT J. Image and Video Procss, 3(3), 572-576. |
24 | Naveenkumar, S. K., & Panduranga, H. T. (2013, July). Partial image encryption for smart camera. In Recent Trends in Information Technology (ICRTIT), 2013 International Conference on (pp. 126-132). IEEE. |
25 | Nandeesh, G. S., Vijaya, P. A., & Sathyanarayana, M. V. (2013). An Image Encryption using Bit level permutation and dependent diffusion. International Journal of Computer Science and Mobile Computing, 2(5), 145-154. |
26 | Kaur, G., & Malhotra, S. A Hybrid Approach for Data Hiding using Cryptography Schemes. |
27 | Panduranga, H. T., Sharath Kumar, H. S., & Naveen Kumar, S. K. (2012, December). Hybrid approach for dual image encryption using nibble exchange and Hill-cipher. In Machine Vision and Image Processing (MVIP), 2012 International Conference on (pp. 101-104). IEEE. |
28 | Chhotaray, S. K. (2012). Asymmetric Image Encryption based on Cipher Matrices. |
29 | Panduranga, H. T. (2012). Hybrid Approach for Image Encryption Using Hill Cipher Technique. In Wireless Networks and Computational Intelligence (pp. 200-205). Springer Berlin Heidelberg. |
30 | Selvi, A. K., & Sathik, M. M. (2012). Secret Sharing Scheme for Image Encryption Based on Primitive Root Theorem. International Journal of Control and Automation, 5(3), 37-46. |
31 | Panduranga, H. T. (2012). Encryption approach for images using bits rotation reversal and extended hill cipher techniques. International journal of computer applications, 59(16). |
32 | Panduranga, H. T., & Kumar, S. N. (2012). Advanced partial image encryption using two-stage hill cipher technique. International Journal of Computer Applications (0975-8887), 60(16). |
33 | Dey, S. (2012, June). SD-EI: A cryptographic technique to encrypt images. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 28-32). IEEE. |
34 | Dey, S. (2012, July). SD-AEI: An advanced encryption technique for images. In Digital Information Processing and Communications (ICDIPC), 2012 Second International Conference on (pp. 68-73). IEEE. |
35 | Dewangan, S., Pandey, M. S., & Khan, M. I. Design of a Cryptosystem Using Two-Level Hill Cipher. |
36 | Sathik, M. M. (2011). Polynomial based secret sharing scheme for image encryption based on mathematical theorem. International Journal of Advanced Research in Computer Science, 2(1). |
37 | Shanmugam, P., & Loganathan, C. (2011). Involutory Matrix In Visual Cryptography. a a, 22, 21. |
38 | Acharya, B., Thomas, N., Arasu, D. R., & Prasad, N. V. (2011, February). Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices. In Proceedings of the 2011 International Conference on Communication, Computing & Security (pp. 606-609). ACM. |
39 | Vellanki, U. S., Varanasi, A., & Kumar, S. U. (2010). Advanced Hill Cipher Handling the Entire Plaintext as a Single Block. International Journal of Advanced Research in Computer Science, 1(4). |
40 | Sathik, M. M., & Selvi, A. K. (2010). An Image Encryption Decryption Method Using Secret Based Transformation Matrix. Digital Image Processing, 2(10), 401-404. |
41 | Varghese, J. (2010). Image Encryption and Compression using Embedding Technique (Doctoral dissertation, Christ University). |
42 | Acharya, B., Sharma, M. D., Tiwari, S., & Minz, V. K. (2010). Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem. Procedia Computer Science, 2, 242-247. |
43 | Selvi, A. K., & Sathik, D. M. M. (2010). Multimedia Security Using Secret Sharing Scheme for Image Encryption. International Journal of Computer AND Internet Security, 57-66. |
44 | Majhi, J. (2009).Modified hill-cipher and crt methods in galois field gf (2 m) for cryptography (Doctoral dissertation, National Institute Of Technology Rourkela). |
45 | Adnan, A., Cazan, A., Safa, M., Lung, A. W. M., & Williams, G. (2009). Evaluation of potential manufacturing suppliers using analytical hierarchy process and cluster analysis for benchmarking. International Journal of Security, 3(3), 36. |
46 | Panigrahy, S. K., Jena, D., Korra, S. B., & Jena, S. K. (2009). On the privacy protection of biometric traits: palmprint, face, and signature. In Contemporary Computing (pp. 182-193). Springer Berlin Heidelberg. |
47 | Acharya, B., Patra, S. K., & Panda, G. (2009). Involutory, permuted and reiterative key matrix generation methods for Hill cipher system. matrix, 2, 1. |
48 | Hamamreh, R. A., & Farajallah, M. (2009). Design of a robust cryptosystem algorithm for non-invertible matrices based on hill cipher. International Journal of Computer Science and Network Security, 11-16. |
49 | Acharya, B., Panigrahy, S. K., Patra, S. K., & Panda, G. (2009). Image encryption using advanced hill cipher algorithm. International Journal of Recent Trends in Engineering, 1(1). |
50 | Panigrahy, S. K., Acharya, B., & Jena, D. (2008). Image encryption using self-invertible key matrix of hill cipher algorithm. |
A. J. Menezes, P.C. Van Oorschot, S.A. Van Stone, “Handbook of Applied Cryptography”, CRC press, 1996 | |
Blakley G.R., “Twenty years of cryptography in the open literature”, Security and Privacy 1999, Proceedings of the IEEE Symposium, 9-12 May 1999 | |
Bruce Schneir, “Applied Cryptography”, 2nd edition, John Wiley & Sons, 1996 | |
Imai H., Hanaoka G., Shikata J., Otsuka A., Nascimento A.C., “Cyptography with Information Theoretic Security”, Information Theory Workshop, 2002, Proceedings of the IEEE, 20-25 Oct 2002 | |
W. Stallings, “Cryptography and Network Security”, 4th edition, Prentice Hall, 2005 | |
Mr. Bibhudendra Acharya
- India
bibhudendra@gmail.com
Mr. Girija Sankar Rath
- India
Mr. Sarat Kumar Patra
- India
Mr. Saroj Kumar Panigrahy
- India
|
|
|
|
View all special issues >> | |
|
|