A Detailed Analysis on Encryption of Messages Using Cryptographic Model with Matrices
AUTHORS
Kalluri Prasanthi,III - B.TECH, CSE and Section - I, Vignan’s Institute of Information Technology, Visakhapatnam, India
ABSTRACT
The simpler concept of Mathematics which helps to protect the data with methodology called Cryptography. In this a most simple form of Cryptography with matrices one can add a coding matrix for the coding matrix, and so on. With the more levels added, the more secure the message will be. In this a message is taken and encrypted it into a string of numbers via Matrix Multiplication. Then numbers at output are decrypted back into a written message by Inverse Matrix Multiplication.
KEYWORDS
Cryptography, Decryption, Encryption, Invertible matrix, Matrix multiplication
REFERENCES
[1] Neha Sharma and Sachin Chirgaiya, “A novel approach to hill cipher”, International Journal of Computer Applications, vol.108, no.11, pp.34-37, (2014)
[2] Wissam Raji, “An introductory course in elementary number theory,” Publisher Saylor Foundation, (2016)
[3] Muhammad Donni Lesmana Siahaan et. al., “Application of hill cipher algorithm in securing text messages,” International Journal of Innovative Research in Advanced Engineering, vol.12, no.2, pp.13-18, (2018) DOI: 10.31227/osf.io/n2kdb(CrossRef)(Google Scholar)
[4] P. Shanmugam and C. Loganathan, “Involuntary matrix in cryptography”, IJRR, vol.6, no.4, March, pp.10-16, (2011)
[5] Salman A. Khan, “Design and analysis of playfair ciphers with different matrix sizes,” International Journal of Computing and Network Technology, vol.3, no.3, pp.117-123, (2015) DOI: http://dx.doi.org/10.12785/IJCNT/030305(CrossRef)(Google Scholar)
[6] Dr. JyotiShinde et. Al., “A method for encryption and decryption of large messages by using matrices,” International Journal of Latest Engineering Research and Applications, vol.2, pp.61-66, (2017)
[7] K Thiagarajan et. Al., “Encryption and decryption algorithm using algebraic matrix approach,” National Conference on Mathematical Techniques and its Applications, pp.1-7, (2018)
[8] Sani Isa and Abdulaziz B. M. Hamed, “Cryptography using congruence modulo relations”, American Journal of Engineering Research, vol.6, no.3, pp.156-160, (2016)