A Detailed Analysis on Encryption of Messages Using Cryptographic Model with Matrices

AUTHORS

Kalluri Prasanthi,III - B.TECH, CSE and Section - I, Vignan’s Institute of Information Technology, Visakhapatnam, India

ABSTRACT

The simpler concept of Mathematics which helps to protect the data with methodology called Cryptography. In this a most simple form of Cryptography with matrices one can add a coding matrix for the coding matrix, and so on. With the more levels added, the more secure the message will be. In this a message is taken and encrypted it into a string of numbers via Matrix Multiplication. Then numbers at output are decrypted back into a written message by Inverse Matrix Multiplication.

 

KEYWORDS

Cryptography, Decryption, Encryption, Invertible matrix, Matrix multiplication

REFERENCES

[1]      Neha Sharma and Sachin Chirgaiya, “A novel approach to hill cipher”, International Journal of Computer Applications, vol.108, no.11, pp.34-37, (2014)
[2]      Wissam Raji, “An introductory course in elementary number theory,” Publisher Saylor Foundation, (2016)
[3]      Muhammad Donni Lesmana Siahaan et. al., “Application of hill cipher algorithm in securing text messages,” International Journal of Innovative Research in Advanced Engineering, vol.12, no.2, pp.13-18, (2018) DOI: 10.31227/osf.io/n2kdb(CrossRef)(Google Scholar)
[4]      P. Shanmugam and C. Loganathan, “Involuntary matrix in cryptography”, IJRR, vol.6, no.4, March, pp.10-16, (2011)
[5]      Salman A. Khan, “Design and analysis of playfair ciphers with different matrix sizes,” International Journal of Computing and Network Technology, vol.3, no.3, pp.117-123, (2015) DOI: http://dx.doi.org/10.12785/IJCNT/030305(CrossRef)(Google Scholar)
[6]      Dr. JyotiShinde et. Al., “A method for encryption and decryption of large messages by using matrices,” International Journal of Latest Engineering Research and Applications, vol.2, pp.61-66, (2017)
[7]      K Thiagarajan et. Al., “Encryption and decryption algorithm using algebraic matrix approach,” National Conference on Mathematical Techniques and its Applications, pp.1-7, (2018)
[8]      Sani Isa and Abdulaziz B. M. Hamed, “Cryptography using congruence modulo relations”, American Journal of Engineering Research, vol.6, no.3, pp.156-160, (2016)

CITATION

  • APA:
    Prasanthi,K.(2020). A Detailed Analysis on Encryption of Messages Using Cryptographic Model with Matrices. International Journal of Smart Home, 14(1), 31-38. 10.21742/IJSH.2020.14.1.04
  • Harvard:
    Prasanthi,K.(2020). "A Detailed Analysis on Encryption of Messages Using Cryptographic Model with Matrices". International Journal of Smart Home, 14(1), pp.31-38. doi:10.21742/IJSH.2020.14.1.04
  • IEEE:
    [1] K.Prasanthi, "A Detailed Analysis on Encryption of Messages Using Cryptographic Model with Matrices". International Journal of Smart Home, vol.14, no.1, pp.31-38, Apr. 2020
  • MLA:
    Prasanthi Kalluri. "A Detailed Analysis on Encryption of Messages Using Cryptographic Model with Matrices". International Journal of Smart Home, vol.14, no.1, Apr. 2020, pp.31-38, doi:10.21742/IJSH.2020.14.1.04

ISSUE INFO

  • Volume 14, No. 1, 2020
  • ISSN(p):1975-4094
  • ISSN(e):2383-725X
  • Published:Apr. 2020

DOWNLOAD