CFP last date
15 May 2024
Reseach Article

LRUD Shift based Encryption Method using Matrices

by Pankesh Bamotra
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 2
Year of Publication: 2013
Authors: Pankesh Bamotra
10.5120/ijais12-450843

Pankesh Bamotra . LRUD Shift based Encryption Method using Matrices. International Journal of Applied Information Systems. 5, 2 ( January 2013), 20-23. DOI=10.5120/ijais12-450843

@article{ 10.5120/ijais12-450843,
author = { Pankesh Bamotra },
title = { LRUD Shift based Encryption Method using Matrices },
journal = { International Journal of Applied Information Systems },
issue_date = { January 2013 },
volume = { 5 },
number = { 2 },
month = { January },
year = { 2013 },
issn = { 2249-0868 },
pages = { 20-23 },
numpages = {9},
url = { https://www.ijais.org/archives/volume5/number2/415-0843/ },
doi = { 10.5120/ijais12-450843 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T16:00:35.888378+05:30
%A Pankesh Bamotra
%T LRUD Shift based Encryption Method using Matrices
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 5
%N 2
%P 20-23
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper deals with a novel and secure method of encryption using matrices and public key cryptography algorithm. Matrices have a very well-known property of invertibility i. e. if AX=B then X=A-1B[1]. This paper exploits this property to achieve encryption of plain text into cipher text. The idea is simple and intriguing. A non-singular integer valued square matrix Ai. e. det|A| ? 0 is taken so that A is invertible and it is possible to obtain A-1. This matrix A serves as the encryption matrix. The plain text to be encrypted is taken and ASCII values of each character is obtained and matrix X is formed such that Aq x q × Xq x r= Bq x r. Before performing the multiplication of A and X to obtain cipher text ASCII value matrix B, circular shift operation is performed on rows and/ or columns of A. A single operation is stored as a string of 4 values viz. R32L9 or C8D61. The first character tells whether the circular shift operation is to be done on a row or a column. Second value tells the row or column number. Third character tells whether row is to be shifted left or right or if column is to be shifted then either up or down. The last value tells the number of times shift operation has to be performed. Successive operations are concatenated with a hyphen viz. R2R45-C6U8-C32D9 and encryption matrix A' is obtained. This key along with the matrix B' (=A'×X) is encrypted using RSA algorithm and sent to the other user who has the original matrix A. Receiver decrypts the message using private key, performs shift operation, finds the inverse of matrix A' as A' -1and finds A' -1× B' to eventually obtain X and hence the original plain text message.

References
  1. Jin Ho Kwak and Sungpyo Hong, Linear Algebra, Second Edition
  2. Sesha Pallavi Indrakanti and P. S. Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887), Volume 28 No. 8, August 2011
  3. William Stallings, Cryptography And Network Security, 4/E
  4. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 2nd edition, Prentice Hall
Index Terms

Computer Science
Information Sciences

Keywords

Encryption matrices circular shift RSA