TY - GEN

T1 - Randomized approach for block cipher encryption

AU - Nagaraj, Srinivasan

AU - Raju, D. S.V.P.

AU - Bhamidipati, Kishore

PY - 2013/1/1

Y1 - 2013/1/1

N2 - In cryptography, a substitution block cipher is a method of encryption by which units of plain text are replaced with cipher text according to a regular system. The receiver deciphers the text by performing an inverse substitution. If the cipher operates on single blocks, it is termed as simple substitution block cipher. The proposed method that considers a random matrix which is chosen from the length of the given input text. Here the input text is stored in the matrices which are selected with minimum cost. There on the series of operations are performed and cipher text is produced, in decryption inverse matrix is calculated and the operations are performed in order to generate the plain text. As we are using random matrix and then the inverse matrix calculation is performed which adds more security for cracking the key. Thus, the cipher text obtained is very difficult to be broken without knowing the key, which provides high security.

AB - In cryptography, a substitution block cipher is a method of encryption by which units of plain text are replaced with cipher text according to a regular system. The receiver deciphers the text by performing an inverse substitution. If the cipher operates on single blocks, it is termed as simple substitution block cipher. The proposed method that considers a random matrix which is chosen from the length of the given input text. Here the input text is stored in the matrices which are selected with minimum cost. There on the series of operations are performed and cipher text is produced, in decryption inverse matrix is calculated and the operations are performed in order to generate the plain text. As we are using random matrix and then the inverse matrix calculation is performed which adds more security for cracking the key. Thus, the cipher text obtained is very difficult to be broken without knowing the key, which provides high security.

UR - http://www.scopus.com/inward/record.url?scp=84872252569&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84872252569&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-35314-7_62

DO - 10.1007/978-3-642-35314-7_62

M3 - Conference contribution

AN - SCOPUS:84872252569

SN - 9783642353130

T3 - Advances in Intelligent Systems and Computing

SP - 551

EP - 558

BT - Proceedings of the International Conference on Frontiers of Intelligent Computing

PB - Springer Verlag

T2 - 1st International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2012

Y2 - 22 December 2012 through 23 December 2012

ER -