Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting
نویسندگان
چکیده
This paper is discussed about the strength of extended cipher due to non-linear transformation of interweave transposition and shifting operations. The impact of number of iterations on the avalanche effect is investigated. During encryption process the interweaving of the resulting plaintext, at each stage of the iteration, and the multiplication with the key matrix followed by transposition and shifting leads to confusion and diffusion. While decryption of the cipher text obtained after encryption process makes the use of reverse shifting and inverse transposed interweaving . From the cryptanalysis performed in this investigation, we have found that the cipher is a strong one. Here we propose Hill cipher modifications using Transposed Interweaved Shifting with significantly less computational complexity. The proposed modifications decrease encryption time while keeping the strength of the ciphers . It has been found that the extended algorithm takes less execution time when compared with DES and is more efficient in terms of execution.
منابع مشابه
An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher
This work proposes an improved scheme to encrypt the digital image for its security. The proposed system is divided into 3 main phases. In first phase, the single digit number into which the given digital image can be divided is calculated. In the second phase, bit rotation, reversal & randomization method is applied on each block of the image. In the third phase, the extended hill cipher techn...
متن کاملFPGA Can be Implemented Using Advanced Encryption Standard Algorithm
This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...
متن کاملEncryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques
A new method for image encryption with two stages has been described in the present study. In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, number of bits equal to the length of password are rotated and then reversed. In second stage, extended hill cipher technique is applied by using involutory matrix generated by same pas...
متن کاملA Noval Security Mechanism for Image Authentication and Copyright Protection
Encryption and watermarking are two primary and complementary technologies for protecting multimedia content. In this paper, we present a hybrid image protection scheme to establish a robust content-based authentication by using novel cryptosystem based on matrix transformation for generation of encryption key and copyright protection by using SVD based watermarking system. This paper suggests ...
متن کاملProposed Model of Block Based Symmetric Cipher
This paper is presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, pdf, audio. Using decryption model, decrypt same data. Due to the simplicity of the proposed model, it is very efficient. This model is also much secured due...
متن کامل