Loading…

Modification in Hill Cipher for Cryptographic Application

To keep the information, secure from various contenders is an important factor for data security. For any organization, it is an incredibly important feature to timely transmit secured data. Optimized techniques for key management and protected encryption algorithms are always helpful for reducing t...

Full description

Saved in:
Bibliographic Details
Published in:3C tecnología 2019-05, Vol.8 (1), p.240-257
Main Authors: Qazi, Farheen, Khan, Fozia Hanif, Agha, Dur–e–Shawar, Khan, Sadiq Ali, Rehman, Saqib ur
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To keep the information, secure from various contenders is an important factor for data security. For any organization, it is an incredibly important feature to timely transmit secured data. Optimized techniques for key management and protected encryption algorithms are always helpful for reducing the overhead of the system and maintain the integrity, authentication and confidentiality of data. Cryptographic applications play an important role in our daily lives through sending emails, exchanging bank account transaction information, through mobile communication and through ATM card transaction. To secure our information from unauthorized users, Hill Cipher is one of the most well-known symmetric cryptosystems. For Hill Cipher, here we are proposed an algorithm for encryption and decryption which is based upon the transposition, substitution and left-right shift.
ISSN:2254-4143
2254-4143
DOI:10.17993/3ctecno.2019.specialissue2.240-257