Abstract Views :178 |
PDF Views:0
Authors
Affiliations
1 Department of Mathematics, Himachal Pradesh University, Summer Hill, Shimla - 171005, IN
Source
International Journal of Technology, Vol 4, No 1 (2014), Pagination: 248-251
Abstract
Lester S. Hill in 1929 introduced non-singular matrices to encrypt and decrypt the message in the symmetric key cryptography. Block ciphers designing and cryptographic hash functions have the use of matrices. Here, we introduce permutations, iterations and finite field in the Hill cipher to provide more security and make it free from vulnerable attacks.
Keywords
Encryption, Decryption, Finite Field, Hill Cipher.