A Modified Feistel Cipher Involving XOR Operation and Modular Arithmetic Inverse of a Key Matrix
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2012, Vol 3, Issue 7
Abstract
In this paper, we have developed a block cipher by modifying the Feistel cipher. In this, the plaintext is taken in the form of a pair of matrices. In one of the relations of encryption the plaintext is multiplied with the key matrix on both the sides. Consequently, we use the modular arithmetic inverse of the key matrix in the process of decryption. The cryptanalysis carried out in this investigation, clearly indicates that the cipher is a strong one, and it cannot be broken by any attack.
Authors and Affiliations
V. Sastry, K. Kumar
Automatic Control of Colonoscope Movement for Modern Colonoscopy
The paper presents the mathematical realization of the trajectory that the colonoscope should have in the medical intervention, as well as the mathematical demonstration of the functions that make up the colonoscope. The...
Role Based Multi-Agent System for E-Learning (MASeL)
Software agents are autonomous entities that can interact intelligently with other agents as well as their environment in order to carry out a specific task. We have proposed a role-based multi-agent system for e-learnin...
The Apsidal Precession for Low Earth Sun Synchronized Orbits
By nodal regression and apsidal precession, the Earth flattering at satellite low Earth orbits (LEO) is manifested. Nodal regression refers to the shift of the orbit’s line of nodes over time as Earth revolves around the...
Safety and Performance Evaluation Method for Wearable Artificial Kidney Systems
This paper focuses on international standards and guidelines related to evaluating the safety and performance of wearable dialysis systems and devices. The applicable standard and evaluation indices for safety and perfor...
Analysis of Security Requirements Engineering: Towards a Comprehensive Approach
Software’s security depends greatly on how a system was designed, so it’s very important to capture security requirements at the requirements engineering phase. Previous research proposes different approaches, but each i...