Encryption and Decryption of Messages Using two Different Non-Singular Matrices

Authors

  • Veena T   Assistant Professor, Department of Mathematics, Government First Grade College, Chickaballapur, India

Keywords:

Non Singular Matrix, Cipher Text, Plain Text, Encryption, Decryption, Scilab and Wxmaxima.

Abstract

The purpose of this article is to secure message transmission using two different 2×2 non- singular matrices as key. The encryption process involves converting plain text messages in to numerical values, splitting them in to pairs, and then encrypting each pair using matrix A followed by matrix B. This double encryption provides more effective to secure plain text messages. The decryption process involves finding the inverses of matrices B and A, and then decrypting each pair using B^(-1) followed by A^(-1). This double matrix encryption technique provides more effective security for messages transmission and to decrypt the messages.

References

  1. Cryptography and network  security : principles and practice , 4th Edition by William Stallings, Prntice Hall , Nov 26, 2005.
  2. S.S.Dhenakaran, M IIayaraja. “Extension  play fair Cipher using 16×16 Matrix “volume 48-No.7, June 2012.
  3. Wissam Raji, An introductory course in elementary number theory, publisher Saylor foundation 2016.
  4. W. Edwin Clark. Elementary Number Theory. University of south Florida, Dec 2002.
  5. Dr.James H Yu and Mr. Tom K. Le. “Internet and network Security”,  “Journal of industrial technology”, volume 17, Number1-November 2000 to January 2001.
  6. Hongbo Zhou, Mutka and Lionel M. Ni Multiple-key Cryptography-based Distribted Certificate  Authority in Mobile Ad-hoevNetworks, IEEE proceedings of GLOBESCOM,2005, 1681-1685.
  7. Abdulaziz  B.M Hamed and Ibrahim O.A.Albudawe. Cryptography using congruence modulo relations. American Journal of Engineering Research, 2017.
  8. R. L. Rivest, The MDS message –digest algorithm , RFC 1321,April 1992.
  9. O. Dunkelman, N, Keller, A Shamir, A practical-time attack on the KASUM cryptosystem used in GSM and 3G telephony,” Advances in Cryptology , Proceed-ings Crypto’10 LNCS,T,Rabin, Ed., Springer, Heidelberg, 2010, in print.
  10. Neha Sharma, Sachin Chirgaiya. A novel approach to Hill Cipher , international journal of computer applications, India , 2014.

Downloads

Published

2019-02-22

Issue

Section

Research Articles

How to Cite

[1]
Veena T "Encryption and Decryption of Messages Using two Different Non-Singular Matrices" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 6, Issue 1, pp.625-629, January-February-2019.