Cryptography using generalized Fibonacci matrices with Affine-Hill cipher

نویسندگان

چکیده

In this article, we have proposed a public key cryptography using Affine-Hill cipher with generalised Fibonacci matrix(called multinacci matrix). Also establishment(exchange of matrix order λ×λ for encryption-decryption) scheme the help sequences under prime modulo. scheme, instead exchanging matrix, need to exchange only pair numbers (λ, k), which reduces time complexity as well space and comes large key-space.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis and Design of Affine and Hill Cipher

Cryptography is the study of mathematical techniques for all aspects of information security. Cryptanalysis is the complementary science concerned with the methods to defeat these techniques. Cryptology is the study of cryptography and cryptanalysis. The security of information encompasses the following aspects: • confidentiality or privacy, • data integrity, • authentication, • nonrepudiation....

متن کامل

Image Encryption Using Advanced Hill Cipher Algorithm

The Hill cipher algorithm is one of the symmetric key algorithms that have several advantages in data encryption. But, the inverse of the key matrix used for encrypting the plaintext does not always exist. Then if the key matrix is not invertible, then encrypted text cannot be decrypted. In the Involutory matrix generation method the key matrix used for the encryption is itself invertible. So, ...

متن کامل

A Block Cipher Obtained By Blending Modified Feistel Cipher And Advanced Hill Cipher Involving A Pair Of Key Matrices

In this investigation, we have developed a block cipher by blending a modified Feistel cipher and the advanced Hill cipher. In this analysis, we have made use of a pair of involutory matrices, say A and B which include the keys K and L. Here the size of the plaintext is 1024 binary bits and the size of the keys (both put together) is 256 binary bits. The involutory matrices A and B, the modular...

متن کامل

Comparative study between stream cipher and block cipher using RC4 and Hill Cipher

Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information transferred during communication by using the Meet...

متن کامل

On The Generalized Fibonacci And Pell Sequences By Hessenberg Matrices

In this paper, we consider the generalized Fibonacci and Pell Sequences and then show the relationships between the generalized Fibonacci and Pell sequences, and the Hessenberg permanents and determinants. 1. Introduction The Fibonacci sequence, fFng ; is de…ned by the recurrence relation, for n 1 Fn+1 = Fn + Fn 1 (1.1) where F0 = 0; F1 = 1: The Pell Sequence, fPng ; is de…ned by the recurrence...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Discrete Mathematical Sciences and Cryptography

سال: 2021

ISSN: ['2169-0065', '0972-0529']

DOI: https://doi.org/10.1080/09720529.2020.1838744