ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER

Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 3

Abstract

In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goal is to build upon the new Asymmetric key algorithm based on linear block cipher or Hill cipher encryption codes of existing methods and design a set of simulation and emulation. It is the scheme based on the block cipher. All the encryption is based on the Alphabets and numbers. Here, we are creating synthetic data value, based on the 26 alphabets and 0-9 numerals. Encryption as cipher text use invertible square matrix, blocking the message according to the selected square matrix i.e if the square matrix is 3 x 3 make the message or plain text 3 blocks, and select ā€˜e’ as any natural number and multiply with selected matrix and message, use modulation 37, then the remainder is our cipher text or encrypted message. This factor is then transmitted. At decryption we use the inverse of the square matrix and inverse of e value which is now called as d and multiply with received message and use modulation 37, then remainder is our plain Text or message. The decryption algorithm will be there for the receiver as the private key known as k!. The concept of this new algorithm is based on modular 37 (alphabets an numerals) whereas existing algorithms are based only on modular 26 (only alphabets). We are naming this linear based algorithm as New linear block cipher or Nlbc.

Authors and Affiliations

PRAKASH KUPPUSWAMY , Dr. C. CHANDRASEKAR,

Keywords

Related Articles

NETWORK INTRUSION DETECTION SYSTEM USING REDUCED DIMENSIONALITY

Intrusion Detection System (IDS) is the science of detection of malicious activity on a computer network and the basic driver for network security. It is defined as a process of monitoring the events occurring in a compu...

IDENTIFYING NETWORK LOAD BALANCING REQUIREMENTS ON HISTORICAL TRAFFIC FLOW USING MACHINE LEARNING APPROACH FOR FLEXIBLE MULTIPATH NETWORKS

Multipath routing uses several paths to distribute traffic from a source to destination. This not only improves network performance but also achieves load balancing and fault tolerance. Though multipath routing is not de...

Load and Energy Consumption based Scheduling Algorithm for Wireless Sensor Networks (LECSA)

Sleep/Wake up scheduling for Wireless Sensor Networks has become an essential part for its working. In this paper, the Low Energy Adaptive Clustering Hierarchy (LEACH) which introduced the concept of clustering in sensor...

Connectionist Network and its Application for Optimization

Connectionist network is the network of processing elements. These processing elements are connected with each other. It suggests that we may consider it as the fully connected network. The processing elements of this ne...

Impact of Aspect Orientation on Object Oriented Software Metrics

Object Oriented Paradigm has become quite popular over recent years and has completely replaced the Procedural Oriented Paradigm. Object-Oriented Programming (OOP) encourages software reuse by providing design and langua...

Download PDF file
  • EP ID EP139871
  • DOI -
  • Views 135
  • Downloads 0

How To Cite

PRAKASH KUPPUSWAMY, Dr. C. CHANDRASEKAR, (2011). ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER. Indian Journal of Computer Science and Engineering, 2(3), 347-355. https://europub.co.uk/articles/-A-139871