GENERALIZED AFFINE TRANSFORMATION BASED ON CIRCULANT MATRICES

The secure transmission of any form of data over a communication medium is prime important across the globe or in research arena. Cryptography is a branch of cryptology and it provides security for data transmission between any communicating parties. The Hill cipher is one of the symmetric key subst...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of distributed and parallel systems 2012-09, Vol.3 (5), p.159-159
Hauptverfasser: Reddy, Adi Narayana K, Vishnuvardhan, B, Prasad, Durga K
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 159
container_issue 5
container_start_page 159
container_title International journal of distributed and parallel systems
container_volume 3
creator Reddy, Adi Narayana K
Vishnuvardhan, B
Prasad, Durga K
description The secure transmission of any form of data over a communication medium is prime important across the globe or in research arena. Cryptography is a branch of cryptology and it provides security for data transmission between any communicating parties. The Hill cipher is one of the symmetric key substitution algorithms. Hill Cipher is vulnerable to known plaintext attack. This paper presents an enhancement to the Hill cipher by utilizing the circulant matrices. The proposed technique shares a prime circulant matrix as a secret key and we choose a non-singular matrix as a public key in such way that the determinant of the coefficient matrix is zero. Computational cost shows that the proposed technique is efficient and it thwarts all the security attacks.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671489960</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1671489960</sourcerecordid><originalsourceid>FETCH-proquest_miscellaneous_16714899603</originalsourceid><addsrcrecordid>eNpjYuA0sDQ307U0NzVnYeA0MjKy1DW2NDXnYOAtLs4yAAIzU0MTY0NOBlt3Vz_XIEcfzyhXFwVHNzdPP1eFkCBHv2A3_yBfxxBPfz8FJ8dgoByQ4ewZ5Bzq4-gXogCUCfJ0dg3mYWBNS8wpTuWF0twMGm6uIc4eugVF-YWlqcUl8bmZxcmpOTmJean5pcXxhmbmhiYWlpZmBsYkKAUARaI38Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1671489960</pqid></control><display><type>article</type><title>GENERALIZED AFFINE TRANSFORMATION BASED ON CIRCULANT MATRICES</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Reddy, Adi Narayana K ; Vishnuvardhan, B ; Prasad, Durga K</creator><creatorcontrib>Reddy, Adi Narayana K ; Vishnuvardhan, B ; Prasad, Durga K</creatorcontrib><description>The secure transmission of any form of data over a communication medium is prime important across the globe or in research arena. Cryptography is a branch of cryptology and it provides security for data transmission between any communicating parties. The Hill cipher is one of the symmetric key substitution algorithms. Hill Cipher is vulnerable to known plaintext attack. This paper presents an enhancement to the Hill cipher by utilizing the circulant matrices. The proposed technique shares a prime circulant matrix as a secret key and we choose a non-singular matrix as a public key in such way that the determinant of the coefficient matrix is zero. Computational cost shows that the proposed technique is efficient and it thwarts all the security attacks.</description><identifier>ISSN: 2229-3957</identifier><identifier>EISSN: 0976-9757</identifier><language>eng</language><subject>Algorithms ; Computational efficiency ; Cryptography ; Globes ; Mathematical analysis ; Matrices ; Matrix methods ; Security</subject><ispartof>International journal of distributed and parallel systems, 2012-09, Vol.3 (5), p.159-159</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780</link.rule.ids></links><search><creatorcontrib>Reddy, Adi Narayana K</creatorcontrib><creatorcontrib>Vishnuvardhan, B</creatorcontrib><creatorcontrib>Prasad, Durga K</creatorcontrib><title>GENERALIZED AFFINE TRANSFORMATION BASED ON CIRCULANT MATRICES</title><title>International journal of distributed and parallel systems</title><description>The secure transmission of any form of data over a communication medium is prime important across the globe or in research arena. Cryptography is a branch of cryptology and it provides security for data transmission between any communicating parties. The Hill cipher is one of the symmetric key substitution algorithms. Hill Cipher is vulnerable to known plaintext attack. This paper presents an enhancement to the Hill cipher by utilizing the circulant matrices. The proposed technique shares a prime circulant matrix as a secret key and we choose a non-singular matrix as a public key in such way that the determinant of the coefficient matrix is zero. Computational cost shows that the proposed technique is efficient and it thwarts all the security attacks.</description><subject>Algorithms</subject><subject>Computational efficiency</subject><subject>Cryptography</subject><subject>Globes</subject><subject>Mathematical analysis</subject><subject>Matrices</subject><subject>Matrix methods</subject><subject>Security</subject><issn>2229-3957</issn><issn>0976-9757</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNpjYuA0sDQ307U0NzVnYeA0MjKy1DW2NDXnYOAtLs4yAAIzU0MTY0NOBlt3Vz_XIEcfzyhXFwVHNzdPP1eFkCBHv2A3_yBfxxBPfz8FJ8dgoByQ4ewZ5Bzq4-gXogCUCfJ0dg3mYWBNS8wpTuWF0twMGm6uIc4eugVF-YWlqcUl8bmZxcmpOTmJean5pcXxhmbmhiYWlpZmBsYkKAUARaI38Q</recordid><startdate>20120901</startdate><enddate>20120901</enddate><creator>Reddy, Adi Narayana K</creator><creator>Vishnuvardhan, B</creator><creator>Prasad, Durga K</creator><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120901</creationdate><title>GENERALIZED AFFINE TRANSFORMATION BASED ON CIRCULANT MATRICES</title><author>Reddy, Adi Narayana K ; Vishnuvardhan, B ; Prasad, Durga K</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_miscellaneous_16714899603</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Algorithms</topic><topic>Computational efficiency</topic><topic>Cryptography</topic><topic>Globes</topic><topic>Mathematical analysis</topic><topic>Matrices</topic><topic>Matrix methods</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Reddy, Adi Narayana K</creatorcontrib><creatorcontrib>Vishnuvardhan, B</creatorcontrib><creatorcontrib>Prasad, Durga K</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of distributed and parallel systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Reddy, Adi Narayana K</au><au>Vishnuvardhan, B</au><au>Prasad, Durga K</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>GENERALIZED AFFINE TRANSFORMATION BASED ON CIRCULANT MATRICES</atitle><jtitle>International journal of distributed and parallel systems</jtitle><date>2012-09-01</date><risdate>2012</risdate><volume>3</volume><issue>5</issue><spage>159</spage><epage>159</epage><pages>159-159</pages><issn>2229-3957</issn><eissn>0976-9757</eissn><abstract>The secure transmission of any form of data over a communication medium is prime important across the globe or in research arena. Cryptography is a branch of cryptology and it provides security for data transmission between any communicating parties. The Hill cipher is one of the symmetric key substitution algorithms. Hill Cipher is vulnerable to known plaintext attack. This paper presents an enhancement to the Hill cipher by utilizing the circulant matrices. The proposed technique shares a prime circulant matrix as a secret key and we choose a non-singular matrix as a public key in such way that the determinant of the coefficient matrix is zero. Computational cost shows that the proposed technique is efficient and it thwarts all the security attacks.</abstract></addata></record>
fulltext fulltext
identifier ISSN: 2229-3957
ispartof International journal of distributed and parallel systems, 2012-09, Vol.3 (5), p.159-159
issn 2229-3957
0976-9757
language eng
recordid cdi_proquest_miscellaneous_1671489960
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals
subjects Algorithms
Computational efficiency
Cryptography
Globes
Mathematical analysis
Matrices
Matrix methods
Security
title GENERALIZED AFFINE TRANSFORMATION BASED ON CIRCULANT MATRICES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-19T07%3A51%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=GENERALIZED%20AFFINE%20TRANSFORMATION%20BASED%20ON%20CIRCULANT%20MATRICES&rft.jtitle=International%20journal%20of%20distributed%20and%20parallel%20systems&rft.au=Reddy,%20Adi%20Narayana%20K&rft.date=2012-09-01&rft.volume=3&rft.issue=5&rft.spage=159&rft.epage=159&rft.pages=159-159&rft.issn=2229-3957&rft.eissn=0976-9757&rft_id=info:doi/&rft_dat=%3Cproquest%3E1671489960%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1671489960&rft_id=info:pmid/&rfr_iscdi=true