Involutory Matrix in Visual Cryptography
نویسندگان
چکیده
In Hill cipher encryption, the complexity of finding the inverse of the matrix during decryption is eliminated by adopting self invertible matrices. Authentication of hall tickets for candidates during examination is a complicated issue. By evaluating simultaneously encryption and decryption with details of text, photos and signatures of candidates it is easy to prevent malpractices during examination held at various centres of the institution.
منابع مشابه
On Constructions of MDS Matrices From Circulant-Like Matrices For Lightweight Cryptography
Maximum distance separable (MDS) matrices have applications not only in coding theory but are also of great importance in the design of block ciphers and hash functions. It is highly nontrivial to find MDS matrices which could be used in lightweight cryptography. In a SAC 2004 paper, Junod et. al. constructed a new class of efficient MDS matrices whose submatrices were circulant matrices and th...
متن کاملOn construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )
Due to their remarkable application in many branches of applied mathematics such as combinatorics, coding theory, and cryptography, Vandermonde matrices have received a great amount of attention. Maximum distance separable (MDS) codes introduce MDS matrices which not only have applications in coding theory but also are of great importance in the design of block ciphers. Lacan and Fimes introduc...
متن کاملOn the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes
In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...
متن کاملAlgebraic construction of cryptographically good binary linear transformations
MaximumDistance Separable (MDS) andMaximumDistance Binary Linear (MDBL) codes are used as diffusion layers in the design of the well-known block ciphers like the Advanced Encryption Standard, Khazad, Camellia, and ARIA. The reason for the use of these codes in the design of block ciphers is that they provide optimal diffusion effect to meet security of a round function of a block cipher. On the...
متن کاملA New Involutory MDS Matrix for the AES
This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns operations by a new involutory matrix in every round. The objective is to provide complete diffusion in a single round, thus sharply improving the overall cipher security. Moreover, the new matrix elements have low Hamming-weight in order to provide equally good perfor...
متن کامل