Encryption and Decryption of Messages Using two Different Non-Singular Matrices
Keywords:
Non Singular Matrix, Cipher Text, Plain Text, Encryption, Decryption, Scilab and Wxmaxima.Abstract
The purpose of this article is to secure message transmission using two different 2×2 non- singular matrices as key. The encryption process involves converting plain text messages in to numerical values, splitting them in to pairs, and then encrypting each pair using matrix A followed by matrix B. This double encryption provides more effective to secure plain text messages. The decryption process involves finding the inverses of matrices B and A, and then decrypting each pair using B^(-1) followed by A^(-1). This double matrix encryption technique provides more effective security for messages transmission and to decrypt the messages.
References
- Cryptography and network security : principles and practice , 4th Edition by William Stallings, Prntice Hall , Nov 26, 2005.
- S.S.Dhenakaran, M IIayaraja. “Extension play fair Cipher using 16×16 Matrix “volume 48-No.7, June 2012.
- Wissam Raji, An introductory course in elementary number theory, publisher Saylor foundation 2016.
- W. Edwin Clark. Elementary Number Theory. University of south Florida, Dec 2002.
- Dr.James H Yu and Mr. Tom K. Le. “Internet and network Security”, “Journal of industrial technology”, volume 17, Number1-November 2000 to January 2001.
- Hongbo Zhou, Mutka and Lionel M. Ni Multiple-key Cryptography-based Distribted Certificate Authority in Mobile Ad-hoevNetworks, IEEE proceedings of GLOBESCOM,2005, 1681-1685.
- Abdulaziz B.M Hamed and Ibrahim O.A.Albudawe. Cryptography using congruence modulo relations. American Journal of Engineering Research, 2017.
- R. L. Rivest, The MDS message –digest algorithm , RFC 1321,April 1992.
- O. Dunkelman, N, Keller, A Shamir, A practical-time attack on the KASUM cryptosystem used in GSM and 3G telephony,” Advances in Cryptology , Proceed-ings Crypto’10 LNCS,T,Rabin, Ed., Springer, Heidelberg, 2010, in print.
- Neha Sharma, Sachin Chirgaiya. A novel approach to Hill Cipher , international journal of computer applications, India , 2014.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.