An optimized encryption technique using an arbitrary matrix with probabilistic encryption

被引:4
作者
Ratha, Paresh [1 ]
Swain, Debabala [2 ]
Paikaray, Bijay [1 ]
Sahoo, Subhadra [3 ]
机构
[1] CUTM, Dept CSE, Bhubaneswar, Orissa, India
[2] KIIT Univ, Sch Comp Engeering, Bhubaneswar, Orissa, India
[3] CET, Bhubaneswar, Orissa, India
来源
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015) | 2015年 / 57卷
关键词
Text Encryption; DES; AES; BLOWFISH; Arbitrary matrix; Multiple Key-Cipher generation;
D O I
10.1016/j.procs.2015.07.422
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a simple Encryption/Decryption technique which enables all kinds of file for encryption and decryption. The method of encryption is not only simple, but also secured enough for transmission. The technique uses simple key generation using an arbitrary matrix. The final encryption is performed through a set of operations using the generated key and original data block and vice-versa in decryption. The generation of keys along with encryption and decryption is performed by the algorithm by putting in the data block and arbitrary matrix. The encryption process can be done by modifying the arbitrary matrix and multiple key can be generated for a single data block. (C) 2015 The Authors. Published by Elsevier B.V.
引用
收藏
页码:1235 / 1241
页数:7
相关论文
共 6 条
[1]   ALGORITHM ENGINEERING FOR PUBLIC KEY ALGORITHMS [J].
BETH, T ;
GOLLMANN, D .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1989, 7 (04) :458-466
[2]  
Ertaul Levent, ELLIPTIC CURVE CRYPT, V7, P48
[3]  
LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm, 2014, AIN SHAMS ENG J
[4]  
Performance Analysis of Encryption Algorithms for Information Security, 2013 INT C CIRC POW, P840
[5]  
The Application of Hybrid Encryption Algorithm in Software Security, 2012, 4 INT C COMP INT COM
[6]  
Wang Baocang, 2007, KNAPSACK BASED PROBA