ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER

Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 3

Abstract

In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goal is to build upon the new Asymmetric key algorithm based on linear block cipher or Hill cipher encryption codes of existing methods and design a set of simulation and emulation. It is the scheme based on the block cipher. All the encryption is based on the Alphabets and numbers. Here, we are creating synthetic data value, based on the 26 alphabets and 0-9 numerals. Encryption as cipher text use invertible square matrix, blocking the message according to the selected square matrix i.e if the square matrix is 3 x 3 make the message or plain text 3 blocks, and select ‘e’ as any natural number and multiply with selected matrix and message, use modulation 37, then the remainder is our cipher text or encrypted message. This factor is then transmitted. At decryption we use the inverse of the square matrix and inverse of e value which is now called as d and multiply with received message and use modulation 37, then remainder is our plain Text or message. The decryption algorithm will be there for the receiver as the private key known as k!. The concept of this new algorithm is based on modular 37 (alphabets an numerals) whereas existing algorithms are based only on modular 26 (only alphabets). We are naming this linear based algorithm as New linear block cipher or Nlbc.

Authors and Affiliations

PRAKASH KUPPUSWAMY , Dr. C. CHANDRASEKAR,

Keywords

Related Articles

FUZZY LOGIC APPLICATION IN POWER SYSTEM FAULT DIAGNOSIS

Fuzzy logic allows a convenient way to incorporate the knowledge of human experts into the expert systems using qualitative and natural language-like expressions. Recent advances in the field of fuzzy systems and a numbe...

MODELING ORDINARY DIFFERENTIAL EQUATIONS IN MATLAB SIMULINK ®

Ordinary differential equations (ODEs) play a vital role in engineering problems. They are used to model continuous dynamical systems as initial and boundary value problems. There are several analytical and numerical met...

HEAD MOUNTED INPUT DEVICE USING MEMS SENSORS

A person who has limited control over their limbs cannot do much for themselves. If this person stay at home, they need others assistance to do a task. Task also implies those concerned with the PC. Hence, to make them h...

SURVEY OF PACKET DROPPING ATTACK IN MANET

Mobile Ad-hoc NETwork (MANET) is an application of wireless network with self-configuring mobile nodes. MANET does not require any fixed infrastructure. Its development never has any threshold range. Nodes in MANET can c...

SURVEY ON HEURISTICS BASED RESOURCE SCHEDULING IN GRID COMPUTING

The most important goal of the Resource Scheduling in Grid Computing is to efficiently map the jobs to resources. Resource Scheduling in Grid computing is a complex task because of the heterogeneous environment. Grid Sch...

Download PDF file
  • EP ID EP139871
  • DOI -
  • Views 99
  • Downloads 0

How To Cite

PRAKASH KUPPUSWAMY, Dr. C. CHANDRASEKAR, (2011). ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER. Indian Journal of Computer Science and Engineering, 2(3), 347-355. https://europub.co.uk/articles/-A-139871