Encoding and Decoding information with the help of Hill Cipher
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2017, Vol 4, Issue 8
Abstract
The role of cryptographic part in today‟s world is very significant. It not only secures information mathematically by mailing massage with a key but also provides confidentiality which is the most important factor in today‟s world. Hill cipher is also one of the most famous symmetric cryptosystem which can be used to protect information from unauthorized party. This paper gives us dimensions of new technique in Hill cipher, here we are developing the complex procedure of key generation for the process of encryption of message to avoid any kind of data loss. Hill cipher is a matrix based poly graphic substitution which is an additional factor to the user. A sender wants to transmit information to a receiver over an insecure channel that is a channel which may be tapped by any one. So, the information which is to be transferred, which we call the plaintext (actual message) which must be transformed (encrypt) to a cipher text, a form not legible by anybody other than the particular receiver. There must be given some way to decrypt the cipher text, i.e. get back the original message, while this must not be possible for receiver to read the information. This is where keys come into play; the receiver is considered to have a key at his disposal, let him to recover the actual message, a fact that distinguishes him from any data loss. This leads to the user for a secure account for user.
Authors and Affiliations
Ashish Vashisht
E-Learning: An Effective virtual way to understand the physical world
The objective of physical laboratory training is to provide an experimental base for the theoretical concepts introduced during the lectures. It gives an opportunity to students to verify ideas which they learn in theory...
Privacy Preserving Similarity Based Text Retrival through Blind Storage in Cloud
In portable distributed computing, a major application is to outsource the versatile information to outside cloud servers for adaptable information stockpiling. To test this issue, in this paper, We build up the Searchab...
Stability Analysis of ‘L-Shaped’ PSC Box Girder Bridge
The structural behaviour of box girder is complicated, which is difficult to analyse in its actual conditions by conventional methods. Prestress technology has been a part of the ‘Bridge Design Practice Manual’ since the...
Wireless Multimedia Sensor Network: A Review
Wireless Sensor Network (WSN) is emerging field of research for multimedia communication. A wireless sensor network (WSN) is a network of spatially distributed devices using sensors in a dense manner. This network monito...
Combined Algorithm For Minimize the Blocking Probability of Real Time and Non-Real Time Services in Handoff
This algorithm is used to minimize the blocking probability and increase the services. Handoff is very important concern in communication. It is related with the mobile phone. When a mobile user travels from one area of...