A large block cipher using linear congruences

被引:0
|
作者
Sastry, V. U. K.
Janaki, V.
机构
关键词
external key; internal key; linear congruences; modular arithmetic inverse;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we have modified the Hill cipher by using linear congruences. In this analysis we have two secret keys: (1) the key matrix, and (2) the key involving the constants occurring in the linear congruences. These two keys are termed as outer key and inner key respectively. From the cryptanalysis carried out in this paper, we have found that the inner key plays a very significant role in strengthening the cipher..
引用
收藏
页码:294 / 298
页数:5
相关论文
共 50 条
  • [21] Software performance characterisation of block cipher structures using S-boxes and linear mappings
    Xiao, L
    Heys, HM
    IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (05): : 567 - 579
  • [22] Zero-correlation Linear Cryptanalysis of SAFER Block Cipher Family Using the Undisturbed Bits
    Yi, Wentan
    Chen, Shaozhen
    Li, Yuchen
    COMPUTER JOURNAL, 2017, 60 (04): : 613 - 624
  • [23] Block Cipher Enhancement Using Pseudo-Random Block Shuffling
    Liew, Jiun-Hau
    Tan, Hee-Yuan
    Lee, Hoon-Jae
    Lim, Hyotaek
    Lee, Sanggon
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 1030 - +
  • [24] Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI
    Yi, Wentan
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2016, 10 (04) : 215 - 221
  • [25] A chosen plaintext linear attack on block cipher CIKS-1
    Lee, C
    Hong, D
    Lee, S
    Lee, S
    Yang, H
    Lim, J
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2002, 2513 : 456 - 468
  • [26] Cryptanalysis of an involutional block cipher using cellular automata
    Sung, Jaechul
    Hong, Deukjo
    Hong, Seokhie
    INFORMATION PROCESSING LETTERS, 2007, 104 (05) : 183 - 185
  • [27] A traceable block cipher
    Billet, O
    Gilbert, H
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 331 - 346
  • [28] Binary Data Encryption using the Sudoku Block Cipher
    Wu, Yue
    Noonan, Joseph P.
    Agaian, Sos
    IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2010), 2010,
  • [29] A Block Cipher using an Iterative Method involving a Permutation
    Susarla, Lakshmi Bhavani Madhuri
    Kumar, S. Udaya
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 275 - 292
  • [30] Image encryption using block cipher and chaotic sequences
    Artiles, Jose A. P.
    Chaves, Daniel P. B.
    Pimentel, Cecilio
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2019, 79 : 24 - 31