Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

LRUD Shift based Encryption Method using Matrices

Pankesh Bamotra Published in Security

International Journal of Applied Information Systems
Year of Publication: 2013
© 2012 by IJAIS Journal
Authors Pankesh Bamotra
10.5120/ijais12-450843
Download full text
  1. Pankesh Bamotra. Article: LRUD Shift based Encryption Method using Matrices. International Journal of Applied Information Systems 5(2):20-23, January 2013. BibTeX

    @article{key:article,
    	author = "Pankesh Bamotra",
    	title = "Article: LRUD Shift based Encryption Method using Matrices",
    	journal = "International Journal of Applied Information Systems",
    	year = 2013,
    	volume = 5,
    	number = 2,
    	pages = "20-23",
    	month = "January",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

This paper deals with a novel and secure method of encryption using matrices and public key cryptography algorithm. Matrices have a very well-known property of invertibility i. e. if AX=B then X=A-1B[1]. This paper exploits this property to achieve encryption of plain text into cipher text. The idea is simple and intriguing. A non-singular integer valued square matrix Ai. e. det|A| ? 0 is taken so that A is invertible and it is possible to obtain A-1. This matrix A serves as the encryption matrix. The plain text to be encrypted is taken and ASCII values of each character is obtained and matrix X is formed such that Aq x q × Xq x r= Bq x r. Before performing the multiplication of A and X to obtain cipher text ASCII value matrix B, circular shift operation is performed on rows and/ or columns of A. A single operation is stored as a string of 4 values viz. R32L9 or C8D61. The first character tells whether the circular shift operation is to be done on a row or a column. Second value tells the row or column number. Third character tells whether row is to be shifted left or right or if column is to be shifted then either up or down. The last value tells the number of times shift operation has to be performed. Successive operations are concatenated with a hyphen viz. R2R45-C6U8-C32D9 and encryption matrix A' is obtained. This key along with the matrix B' (=A'×X) is encrypted using RSA algorithm and sent to the other user who has the original matrix A. Receiver decrypts the message using private key, performs shift operation, finds the inverse of matrix A' as A' -1and finds A' -1× B' to eventually obtain X and hence the original plain text message.

Reference

  1. Jin Ho Kwak and Sungpyo Hong, Linear Algebra, Second Edition
  2. Sesha Pallavi Indrakanti and P. S. Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887), Volume 28 No. 8, August 2011
  3. William Stallings, Cryptography And Network Security, 4/E
  4. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 2nd edition, Prentice Hall

Keywords

Encryption, matrices,circular shift, RSA