Encoding and Decoding information with the help of Hill Cipher

Abstract

The role of cryptographic part in today‟s world is very significant. It not only secures information mathematically by mailing massage with a key but also provides confidentiality which is the most important factor in today‟s world. Hill cipher is also one of the most famous symmetric cryptosystem which can be used to protect information from unauthorized party. This paper gives us dimensions of new technique in Hill cipher, here we are developing the complex procedure of key generation for the process of encryption of message to avoid any kind of data loss. Hill cipher is a matrix based poly graphic substitution which is an additional factor to the user. A sender wants to transmit information to a receiver over an insecure channel that is a channel which may be tapped by any one. So, the information which is to be transferred, which we call the plaintext (actual message) which must be transformed (encrypt) to a cipher text, a form not legible by anybody other than the particular receiver. There must be given some way to decrypt the cipher text, i.e. get back the original message, while this must not be possible for receiver to read the information. This is where keys come into play; the receiver is considered to have a key at his disposal, let him to recover the actual message, a fact that distinguishes him from any data loss. This leads to the user for a secure account for user.

Authors and Affiliations

Ashish Vashisht

Keywords

Related Articles

Securing Digital images using Reversible Watermarking by Pixel Histogram Shifting

A new reversible watermarking Scheme is proposed .One first contribution is a histogram shifting modulation which adaptively takes care of the local specificities of the image content. By applying it to the image predict...

Filtering of Unwanted Messages from OSN User Walls

An information filtering scheme is an information organization designed in support of unstructured or semi structured information. Filtering applications naturally entail streams concerning incoming information, moreover...

Mycoflora Associated with Baobab (Adansonia digitata) and their Effect on the Nutritional Composition of the Leaf and Fruit

Mycoflora associated with leaf and fruit of Baobab (Adansonia digitata) and their effect on the nutritional composition were investigated. Three different mycoflora were isolated from the leaf they include Aspergilus fla...

Design and Implementation of High-Speed Low Power Multipliers Using Reversible Logic

Reversible logic is one of the promising research areas in low power applications such as quantum computing, optical information processing, DNA computing and also thermodynamic technology, Nanotechnology and low power C...

Distributed and Asynchronously Detection of Cut in Wireless Sensor Networks

Wireless sensor networks consist of multiple connected components, Due to multiple connected components, wireless sensor network gets break , which is called a cut. In this article we can detect this potential cuts, by c...

Download PDF file
  • EP ID EP245996
  • DOI -
  • Views 120
  • Downloads 0

How To Cite

Ashish Vashisht (2017). Encoding and Decoding information with the help of Hill Cipher. International journal of Emerging Trends in Science and Technology, 4(8), 5692-5696. https://europub.co.uk/articles/-A-245996