Cryptography & Network Security
Cryptography & Network Security
Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System
ICACC '09 Proceedings of the 2009 International Conference on Advanced Computer Control
H-S-X Cryptosystem and Its Application to Image Encryption
ACT '09 Proceedings of the 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Hi-index | 0.01 |
Data security is the science and study of methods of protecting data in computer and communication system from disclosure to unauthorized users. The main aim of encoding is to make it worthless to everyone except for the party with the deciphering key. Only with the key, a party can decode the cipher text into a meaningful message. Hill cipher is a symmetric cryptosystem and a polygraph substitution cipher based on matrix multiplication. Hill cipher has several advantages in data encryption. Hill cipher requires inverse of the key matrix while decryption. In fact that not all the matrices have an inverse and therefore they will not be eligible as key matrices in the Hill cipher scheme. Furthermore, due to its linear nature, the basic Hill cipher succumbs to known-plaintext attacks. A modified Hill cipher that removes these drawbacks has been used in this paper. In today's world, the usual way of writing a message in text has been replaced by more efficient ways of conveying messages through images, audio, video etc. As long as an electronic file contains irrelevant information, it can be used as a cover to hide messages. In this paper, we encrypt the informative image using the modified Hill cipher technique and the key image. Then use the same key image to decrypt the encrypted image to obtain the image which contains the information.