Academic Journals Database
Disseminating quality controlled scientific knowledge

Optimisation of Public Key Algorithm in Block Cipher using Negative Variables

ADD TO MY LIST
 
Author(s): Prakash Kuppuswamy | C. Chandrasekar

Journal: International Journal of Computer Science Research and Application
ISSN 2012-9564

Volume: 01;
Issue: 01;
Start page: 11;
Date: 2011;
Original page

Keywords: Adjoint Matrix | Determination Matrix | Inverse | Modulation | Linear block | Private key or symmetric key | Public Key or Asymmetric key | Square Matrix | Synthetic Value | Transpose Matrix

ABSTRACT
Internet and networks applications are growing very fast, so the needs to protect such applications are increased. Encryption algorithms play a main role in information security systems. This paper deals with a new algorithm using negative numbers based on linear matrix. It is time efficient and easily learns useful concept and skills. Our goal is to build upon the new Asymmetric key algorithm using linear block cipher or Hill cipher encryption codes of an existing method and design a set of simulation and emulation. Encryption works by running the data (represented as numbers) through a new encryption formula using only negative number using linear matrix and negative value of ā€˜eā€™ value. All the encryption based on the Alphabets and numbers, Here, we are assigning synthetic data value to the alphabets and 0-9 numerals. Encryption as cipher text using invertible square matrix, blocking the message according to the selected square matrix i.e if the square matrix is 3 x 3 make the message or plain text 3 blocks, and select ā€˜eā€™ any natural number (negative) and multiply with selected matrix and message and use modulation 37, then remainder is our cipher text or encrypted message. Hence for which we got a factor which is then transmitted, and then at decryption using invert of the square matrix and inverse of e value i.e called as d and multiply with received message and used modulation 37, remainder is our plain Text or message. The decryption algorithm will be there for the receiver as the private key is known as k-1.
RPA Switzerland

Robotic Process Automation Switzerland

    

Tango Jona
Tangokurs Rapperswil-Jona