ENRICHMENT OF SECURITY THROUGH CRYPTOGRAPHIC PUBLIC KEY ALGORITHM BASED ON BLOCK CIPHER
Journal Title: Indian Journal of Computer Science and Engineering - Year 2011, Vol 2, Issue 3
Abstract
In recent years Data Security using cryptography has emerged as a topic of significant interest in both academic and industry circles. This paper deals with a new algorithm, which is based on linear block cipher. Our goal is to build upon the new Asymmetric key algorithm based on linear block cipher or Hill cipher encryption codes of existing methods and design a set of simulation and emulation. It is the scheme based on the block cipher. All the encryption is based on the Alphabets and numbers. Here, we are creating synthetic data value, based on the 26 alphabets and 0-9 numerals. Encryption as cipher text use invertible square matrix, blocking the message according to the selected square matrix i.e if the square matrix is 3 x 3 make the message or plain text 3 blocks, and select ‘e’ as any natural number and multiply with selected matrix and message, use modulation 37, then the remainder is our cipher text or encrypted message. This factor is then transmitted. At decryption we use the inverse of the square matrix and inverse of e value which is now called as d and multiply with received message and use modulation 37, then remainder is our plain Text or message. The decryption algorithm will be there for the receiver as the private key known as k!. The concept of this new algorithm is based on modular 37 (alphabets an numerals) whereas existing algorithms are based only on modular 26 (only alphabets). We are naming this linear based algorithm as New linear block cipher or Nlbc.
Authors and Affiliations
PRAKASH KUPPUSWAMY , Dr. C. CHANDRASEKAR,
Performance Evaluation of Dynamic and Static Sensor Node in Wireless Sensor Network
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data throug...
Xilinx and Modelsim Habitat for Design of ECC Co-Processor Architecture
Xilinx is a most significant synthesizing tool for controller design in various engineering field specifically industrial engineering, instrumentation engineering, robotics, telecommunication, computer science engineerin...
AN ENERGY EFFICIENT EVENT DETECTION CLASSIFIER IN WIRELESS SENSOR NETWORK USING SUPPORT VECTOR MACHINE
Wireless sensor network (WSN) comprises of nodes that are spatially distributed to monitor the environments and detect the events accordingly. Correlated Data Gathering (CDG) in wireless sensor network used Adaptive and...
LOCAL UPDATE ROUTING USING HIERARCHICAL WPANS IN WIRELESS UNDERWATER SENSOR NETWORKS
The developments of micro and nano sensors lead the sensor networking technology to be used in all kinds of study. In underwater communications and study, wireless sensor network plays a major role. One among the charact...
Performance Study of Live Virtual Machine Migration using KVM Hypervisor
In a cloud computing environment, migrating operating system instances across distinct physical hosts is a useful tool for administrators of data centers and clusters: It allows a clean separation between hardware and so...