Javascript must be enabled to continue!
Self-Invertible Key on Cipher Polygraphic Polyfunction with Eigen Matrix based IMIE
View through CrossRef
Hill Cipher’s System and its modifications are still practiced mainly in sending a secret message involving images. One drawback that the recipient of the message is trying to overcome is to get the decryption key from the cipher text to plain text during the decryption process. Previous studies have proven that using self-invertible keys can reduce the computation cost to obtain this key. This paper generates a self-invertible matrix based on Integer-Entry Matrix with all Integer Eigenvalues (IMIE). Subsequently, we executed it into Cipher Polygraphic Polyfunction Cryptosystem and observed the effect.
Title: Self-Invertible Key on Cipher Polygraphic Polyfunction with Eigen Matrix based IMIE
Description:
Hill Cipher’s System and its modifications are still practiced mainly in sending a secret message involving images.
One drawback that the recipient of the message is trying to overcome is to get the decryption key from the cipher text to plain text during the decryption process.
Previous studies have proven that using self-invertible keys can reduce the computation cost to obtain this key.
This paper generates a self-invertible matrix based on Integer-Entry Matrix with all Integer Eigenvalues (IMIE).
Subsequently, we executed it into Cipher Polygraphic Polyfunction Cryptosystem and observed the effect.
Related Results
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Matrix Subgridding and Its Effects in Dual Porosity Simulators
Matrix Subgridding and Its Effects in Dual Porosity Simulators
Abstract
Naturally fractured reservoirs are found throughout the world and contain significant amounts of oil reserves. The so-called dual porosity model is one o...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Efficiency of Steamflooding in Naturally Fractured Reservoirs
Efficiency of Steamflooding in Naturally Fractured Reservoirs
Abstract
This study aims to identify the effective parameters on matrix heating and recovery, and the efficiencies of these processes while there is a continuous ...
Template attack based on uBlock cipher algorithm
Template attack based on uBlock cipher algorithm
The uBlock cipher algorithm is a family of lightweight block cipher algorithms, which was proposed by Wu Wenling, Zhang Lei and others in 2019. Its block length and key length supp...
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...

