A Cryptosystem Based on Hilbert Matrix using Cipher Block Chaining Mode

نویسندگان

  • Penmetsa V. Krishna Raja
  • A. S. N. Chakravarthy
  • P. S. Avadhani
چکیده

Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools and pattern finding. The objectives of the proposed work are to propose a new cryptographic method based on the special matrix called the Hilbert matrix for authentication and confidentiality and to propose a model for confidentiality and authentication using a combination of symmetric and public cryptosystems. Further, it is extended to shared key cryptosystems with the concept of digital enveloping using a session key. In the present work an algorithm for shared key encryption is developed using Hilbert matrix cryptosystem. In this the block chaining modes of operation have been used to tackle the issues of confusion and diffusion. Keywords— Crypto System, Hilbert Matrix, Cipher Block Chain Encryption,Decryption.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Passwords Management System using Blowfish Cryptographic Algorithm with Cipher Block Chaining Mode

Everyone has the security problem of private information and increase in demand of Internet use, creates security problems which results in loss of internet users passwords. There are too many users on the Internet; you might have found one user having more usernames and passwords, which contains user’s private information. It is difficult to remember all usernames and passwords and unsafe to w...

متن کامل

Encryption quality measurement of a proposed cryptosystem algorithm for the colored images compared with another algorithm

In this paper, a proposed cryptosystem algorithm based on two different chaotic systems is presented. The proposed cryptosystem algorithm is designated as PCACH. A recently developed encryption algorithm which is designated here, as HuXia is reviewed. These two algorithms are applied to three images of different color frequencies, i.e., different types of colored-images are encrypted with each ...

متن کامل

The Cryptanalysis of Feal with Twenty Chosen Plaintexts

The FEAL N cryptosystem has been developed by N T T as a highly programming e cient block cipher system as it does not use look up tables It was rst presented in It is essentially an N round Feistel block cipher operating on bit blocks and determined by a bit key FEAL is the standard block cipher but N T T intend that FEAL can be used in cipher block chaining mode when plaintexts are not reveal...

متن کامل

Biometric Signature of Private Key by Reliable Iris Recognition Based on Flexible-ICA Algorithm

The numerical world is under a fast development generating facilities and threats. The recommended solutions are especially the protection of information in all its states. The levels of protection show a discrepancy from an application to another; governmental, commercial or even cybercriminal. The infrastructure used in modern cryptography is based on public key cryptosystem. The problem is h...

متن کامل

Achieve Date Integrity and Security on Cloud Storage using 3DES Encryption Algorithm

Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. While Cloud services offer flexibility, scalability and economies of scale, there have been commensurate concerns about security. On the similar terms, we have chosen to make use of a combination...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • CoRR

دوره abs/1110.1498  شماره 

صفحات  -

تاریخ انتشار 2011