Have a personal or library account? Click to login
A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration Cover

A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

Open Access
|Sep 2013

References

  1. 1. Hill, L. S. Cryptography in an Algebraic Alphabet. - American Mathematical Monthly, Vol. 36, 1929, No 6, 306-312.10.1080/00029890.1929.11986963
  2. 2. Hill, L. S. Concerning Certain Linear Transformation Apparatus of Cryptography. - American Mathematical Monthly, Vol. 38, 1931, No 3, 135-154.10.1080/00029890.1931.11987161
  3. 3. Stallings, W. Cryptography and Network Security Principles and Practices. 3rd Edition. New Jersey, Prentice Hall, 1999.
  4. 4. Sastry, V. U. K., N. Ravi Shankar. Modified Hill Cipher with Interlacing and Iteration. - Journal of Computer Science, Science Publications, Vol. 3, 2007, No 11, 854-859.10.3844/jcssp.2007.854.859
  5. 5. Sastry, V. U. K., N. Ravi Shankar. Modified Hill Cipher fora Large Block of Plaintext with Interlacing and Iteration. - Journal of Computer Science, Science Publications, Vol. 4, 2008, No 1, 15-20.10.3844/jcssp.2008.15.20
  6. 6. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Hill Cipher Involving Interweaving and Iteration. - International Journal of Network Security, Vol. 11, 2010, No 1, 11-16.
  7. 7. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Large Block Cipher Involving Interweaving and Iteration. - In: Proceedings of the International Conference on Advances and Emerging Trends in Computing Technologies (ICAET’10), 21-24 June 2010, Chennai, 328-333.
  8. 8. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Playfair Cipher Involving Interweaving and Iteration. - International Journal of Computer Theory and Engineering, Vol. 1, December 2009, No 5, 594-598.10.7763/IJCTE.2009.V1.96
  9. 9. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Modified Playfair Cipher for a Large Block of Plaintext. - International Journal of Computer Theory and Engineering, Vol. 1, 2009, No 5, 590-594.10.7763/IJCTE.2009.V1.95
  10. 10. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavan i. A Generalized Playfair Cipher Involving Intertwining, Interweaving and Iteration. - International Journal of Networks and Mobile Technology, Vol. 1, 2010, No 2, 45-53.
  11. 11. Sastry, V. U. K., N. Ravi Shankar, S. Durga Bhavani. A Blending of A Generalized Playfair Cipher and A Modified Hill Cipher. - International Journal of Networks and Mobile Technologies, Vol. 2, 2011, No 1, 35-43.
  12. 12. Sastry, V. U. K., V. Janaki. On the Modular Arithmetic Inverse in the Cryptology of Hill Cipher. - In: Proceedings of North American Technology and Business Conference, September 2005, Montreal, Canada.
  13. 13. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part I. - Cryptologia, Vol. 4, 1980, No 2, 71-85.10.1080/0161-118091854906
  14. 14. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part II. - Cryptologia, Vol. 4, 1980, No 3, 150-168.10.1080/0161-118091855059
  15. 15. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part III. - Cryptologia, Vol. 5, 1981, No 2, 67-77.10.1080/0161-118191855850
  16. 16. Levine, J., R. E. Hartwig. Applications of the Drazin Inverse to the Hill Cryptographic System. Part IV. - Cryptologia, Vol. 5, 1981, No 4, 213-228.10.1080/0161-118191856057
  17. 17. Makar, B. H. Application ofa Certain Class of Infinite Matrices to the Hill Cryptographic System. - Cryptologia, Vol. 7, 1983, No 1, 63-78.10.1080/0161-118391857793
  18. 18. Levine, J., R. Chandler. The Hill Cryptographic System with Unknown Cipher Alphabet, But Known Plaintext. - Cryptologia, Vol. 13, 1989, No 1, 1-28.10.1080/0161-118991863736
  19. 19. Kiele, W. A. A Tensor-Theoretic Enhancement to the Hill Cipher System. - Cryptologia, Vol. 14, 1990, No 3, 225-233.10.1080/0161-119091864931
  20. 20. Thilaka, B., K. Rajalakshmi. An Extension of Hill Cipher Using Generalized Inverses and mth Residue modulo n. - Cryptologia, Vol. 29, 2005, No 4, 267-276.10.1080/0161-110591893933
  21. 21. Saeednia, S. How to Make the Hill Cipher Secure. - Cryptologia, Vol. 24, 2000, No 4, 353-360.10.1080/01611190008984253
  22. 22. Yeh, Y. S., T. C. Wu, C. C. Chang, W. C. Yang. A New Cryptosystem Using Matrix Transformation. - In: Proceedings of the 25th IEEE International Carnahan Conference on Security Technology, 1991, 131-138.
  23. 23. Mahmoud, A. Y., A. G. Chefranov. Hill Cipher Modification Based on Eigenvalues HCMEE. - In: Proceedings of the Second International Conference on Security of Information and Networks (SIN2009), Gazimagusa (TRNC) North Cyprus, A. Elci, M. Orgun, A. Chefranov, (Eds) ACM, New York, USA, 2009, 164-167.10.1145/1626195.1626237
  24. 24. Mahmoud, A. Y., A. G. Chefranov. Hill Cipher Modification Based on Pseudo-Random Eigenvalues. - Fourth coming paper, to appear in Applied Mathematics & Information Sciences.
  25. 25. Lin, C. H., C. Y. Lee, C. Y. Lee. Comments on Saeednia's Improved Scheme for the Hill Cipher. - Journal of the Chinese Institute of Engineers, Vol. 27, 2004, No 5, 743-746.10.1080/02533839.2004.9670922
  26. 26. Toorani, M., A. Falahati. A Secure Cryptosystem Based on Affine Transformation. - Journal of Security and Communication Networks, Vol. 4, 2011, No 2, 207-215.10.1002/sec.137
  27. 27. Toorani, M., A. Falahati. A Secure Variant of the Hill Cipher. - In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC’09), July 2009, 313-316.10.1109/ISCC.2009.5202241
  28. 28. Overbey, J., W. Traves, J. Wojdylo. On the Keyspace of the Hill Cipher. - Cryptologia, Vol. 29, 2005, No 1, 59-72.10.1080/0161-110591893771
  29. 29. Bauer, C., K. Millward. Cracking Matrix Encryption Row by Row. - Cryptologia, Vol. 31, 2007, 76-83. 10.1080/01611190600947806
DOI: https://doi.org/10.2478/cait-2013-0025 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 50 - 63
Published on: Sep 20, 2013
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2013 V. U. K. Sastry, N. Ravi Shankar, S. Durga Bhavani, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons License.