Effect of Self-Invertible Matrix on Cipher Hexagraphic Polyfunction

被引:3
作者
Ching, Sally Lin Pei [1 ,2 ]
Yunos, Faridah [1 ,3 ]
机构
[1] Univ Putra Malaysia, Dept Math, Serdang 43400, Selangor, Malaysia
[2] Boon Siew Honda Sdn Bhd, 676896-A 721,Persiaran Cassia Selatan 1, Simpang Ampat 14100, Penang, Malaysia
[3] Univ Putra Malaysia, Inst Math Res, Serdang 43400, Selangor, Malaysia
关键词
Cipher Polygraphic; Hill cipher; self-invertible matrix; RSA; LUC;
D O I
10.3390/cryptography3020015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A cryptography system was developed previously based on Cipher Polygraphic Polyfunction transformations, C-ixj((t)) equivalent to A(ixi)(t)P(ixj) mod N where C-i x j, P-i x j, A(i x i) are cipher text, plain text, and encryption key, respectively. Whereas, (t) is the number of transformations of plain text to cipher text. In this system, the parameters (A(i x i), (t)) are kept in secret by a sender of messages. The security of this system, including its combination with the second order linear recurrence Lucas sequence (LUC) and the Ron Rivest, Adi Shamir and Leonard Adleman (RSA) method, until now is being upgraded by some researchers. The studies found that there is some type of self-invertible A(4x4) should be not chosen before transforming a plain text to cipher text in order to enhance the security of Cipher Tetragraphic Trifunction. This paper also seeks to obtain some patterns of self-invertible keys A(6x6) and subsequently examine their effect on the system of Cipher Hexagraphic Polyfunction transformation. For that purpose, we need to find some solutions L-3x3 for L-3x3(2) equivalent to A(3x3) mod N when A(3x3) are diagonal and symmetric matrices and subsequently implement the key L-3x3 to get the pattern of A(6x6).
引用
收藏
页码:1 / 18
页数:18
相关论文
共 15 条
  • [1] Acharya B., 2007, International Journal of Security, V1, P14
  • [2] Asbullah M.A., 2019, J SCI, V67, P73, DOI [10.22452/mjs.sp2019no1.6, DOI 10.22452/MJS.SP2019NO1.6]
  • [3] Hamamreh RA, 2009, INT J COMPUT SCI NET, V9, P11
  • [4] Kahn D., 1967, CODEBREAKERS STORY S, P404
  • [5] Mahapatra A., 2007, THESIS
  • [6] Panigrahy S.K., 2008, 1 INT C ADV COMPUTIN, P1
  • [7] Reddy L.S., 2012, INT J SOFT COMPUT EN, V10, P73
  • [8] RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI [10.1145/359340.359342, 10.1145/357980.358017]
  • [9] Rosen K.H., 1987, ELEMENTARY NUMBER TH, P224
  • [10] Satyajeet R, 2014, IJCSIT INT J COMPUTE, V5, P7232