The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Biometric could play an essential role in the future authentication system. So the security of biometric data is becoming a challenging problem now a days. We are proposing a cryptographic algorithm for securing biometric template using double hill cipher with the random permutation of pixels locations and self-invertible key matrix. The random permutation creates diffusion by permuting the location...
The paper describes MS EXCEL-based application implementing the processes of encryption and decryption of English texts using the Hill cipher based on the matrix of size 3×3. The processes of encryption and decryption of 6-character words in English are illustrated. Numerous examples obtained by the application developed are presented in the paper. The material is used in the educational process in...
In computer networks, digital information such as text, audio and video have been broadly exchanging over the communication system. The security of the communication system in the present day imperative conception because the information ingredient of the human life. This paper presents a new hybrid scheme for secure text message transmission. The hybrid scheme is based on Fibonacci series, XOR cipher,...
The Hill cipher algorithm is one of the symmetric key algorithms that have many variations but still not suited for all zeroes plaintext block. Chosen-plaintext attack can be possible on Toorani and Falahati Hill Cipher Algorithm by two closely related variants of Hill Cipher. In this paper we have presented a new approach of Hill Cipher (RDHill Cipher) using DNA cryptography and TFHill Cipher to...
Secured communication of text information is prime importance across the globe. Cryptography is one of the methods to attain security. The Hill cipher is a symmetric encryption algorithm vulnerable to the attack of knownplaintext. This paper proposes a modification to the Hill cipher. In the proposed cryptosystem, a prime circulant matrix is shared as a secret key and a non-singular matrix G is used...
Encryption and decryption technique is normally applied for security enhancement namely by hiding data, messages or images. In this paper, encryption and decryption method based on Hill Cipher is implemented in a car park is discussed. The main focus of applying encryption and decryption on the system is to conceal the images of car plate stored in the database. In addition, prevention from attackers...
In this paper we present a technique for secure communication between two parties Alice and Bob. We use both cryptography and image steganography. We encrypt the secret message by using a new cipher which is extended from Hill cipher. Then the cipher text of the secret message is embedded into the carrier image in 6th, 7th and 8th bit locations of the darkest and brightest pixels. Here 8th bit means...
In this paper we have proposed a technique for securing biometric traits using the modified Hill Cipher with an involutory key and a robust cryptosystem. The Modified Hill Cipher solves the drawbacks of conventional Hill ciphers by using iterations and interlacing. Interlacing of the binary bits of the plaintext image creates confusion while iterations create complexity to the cipher image. The Modified...
Information security is an important issue. Today's encryption technologies can be traced back to the earliest ciphers, and have grown as a result of evolution. The first ciphers were cracked, so new, stronger ciphers emerged. Code breakers set to work on these and eventually found flaws, forcing cryptographers to invent better ciphers and so on. Hill Cipher is one of the most famous symmetric cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.