Extended Hill Cipher Decryption by Using Transposed Interweaved Shifting

نویسندگان

  • Divya Rathi
  • Parmanand Astya
چکیده

This paper is discussed about the strength of extended cipher due to non-linear transformation of interweave transposition and shifting operations. The impact of number of iterations on the avalanche effect is investigated. During encryption process the interweaving of the resulting plaintext, at each stage of the iteration, and the multiplication with the key matrix followed by transposition and shifting leads to confusion and diffusion. While decryption of the cipher text obtained after encryption process makes the use of reverse shifting and inverse transposed interweaving . From the cryptanalysis performed in this investigation, we have found that the cipher is a strong one. Here we propose Hill cipher modifications using Transposed Interweaved Shifting with significantly less computational complexity. The proposed modifications decrease encryption time while keeping the strength of the ciphers . It has been found that the extended algorithm takes less execution time when compared with DES and is more efficient in terms of execution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Cryptographic Technique to Encrypt Images using Extended Hill Cipher

This work proposes an improved scheme to encrypt the digital image for its security. The proposed system is divided into 3 main phases. In first phase, the single digit number into which the given digital image can be divided is calculated. In the second phase, bit rotation, reversal & randomization method is applied on each block of the image. In the third phase, the extended hill cipher techn...

متن کامل

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

This paper mainly focused on implementation of AES encryption and decryption standard AES-128. All the transformations of both Encryption and Decryption are simulated using an iterativedesign approach in order to minimize the hardware consumption. This method can make it avery low-complex architecture, especially in saving the hardware resource in implementing theAES InverseSub Bytes module and...

متن کامل

Encryption Approach for Images using Bits Rotation Reversal and Extended Hill Cipher Techniques

A new method for image encryption with two stages has been described in the present study. In first stage, each pixel of image is converted to its equivalent eight bit binary number and in that eight bit number, number of bits equal to the length of password are rotated and then reversed. In second stage, extended hill cipher technique is applied by using involutory matrix generated by same pas...

متن کامل

A Noval Security Mechanism for Image Authentication and Copyright Protection

Encryption and watermarking are two primary and complementary technologies for protecting multimedia content. In this paper, we present a hybrid image protection scheme to establish a robust content-based authentication by using novel cryptosystem based on matrix transformation for generation of encryption key and copyright protection by using SVD based watermarking system. This paper suggests ...

متن کامل

Proposed Model of Block Based Symmetric Cipher

This paper is presenting cryptography model of block based cipher technique. This model is divided into two sub model one is encryption model and other is decryption model. Using encryption model, encrypt any type of data like text, image, pdf, audio. Using decryption model, decrypt same data. Due to the simplicity of the proposed model, it is very efficient. This model is also much secured due...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014