Application of Non-Singular Matrices in Encryption and Decryption text of Cryptography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 4
Abstract
Cryptography, the science of encrypting messages in secret codes, has played an important role in securing information since past times. The basic idea of cryptography is that information can be encoded using an encryption scheme and can be decoded by anyone who knows about the scheme. There are lots of encryption schemes ranging from very simple to very complex. Most of them are mathematical in nature. Since matrices have unique and very powerful concept and can be easily understood so it could be applied as an efficient way for encrypting and storing text. This article describes some of the techniques of cryptography using matrices. The technique is very simple and can be easily use for encryption of messages confidentially but also not so easy to break if someone does not know the key. The encryption system uses different type of matrices to store the text entered by the sender in the form of their positions and their inverses for decoding the text.
Authors and Affiliations
Babita Bist Ramola
Room Temperature Wear Behavior of 6061AL Alloy and Its Composite Prepared Through Three Stage Melt Stirring Process at 785Âșc
The paper reports on influence of boron carbide particulates addition on wear properties of 6061aluminum metal matrix fabricated via three stage stir casting. In order to facilitate the incorporation of B4Cp into alumin...
Advanced ACO Metaheuristic for Travelling Salesman Problem: A Proposed Technique
ACO meta-heuristic is an advanced approach of solving the various combinatorial optimization problems with positive feedback. ACO algorithms has some limitations such as pheromone stagnation due to which the optimal res...
An Investigation of Heat Transfer in Vertical Shaft Kiln Process of Cement Manufacture: Part I - Convection
Packed bed heat transfer associated with the black meal vertical shaft kiln (VSK) process of cement manufacture was studied using varying feed sizes of the raw material and air flow rates using an experimental prototype...
Prevention of DOS and Black Hole Attack in AODV
Mobile Ad Hoc Network (MANET) is a self-configuring, gathering of wireless devices and infrastructure-less network technology used to create a wireless network without wire using mobile nodes. In MANET all devices are f...
slugDesign and Analysis of Multi Leaf Springs Using Composite Materials
Weight reduction has been the main/primary focus of automobile manufactures. The automobile industries have shown interests in replacement of steel springs with composite leaf springs due to high strength to weight rati...