### Abstract

In cryptography, a substitution block cipher is a method of encryption by which units of plain text are replaced with cipher text according to a regular system. The receiver deciphers the text by performing an inverse substitution. If the cipher operates on single blocks, it is termed as simple substitution block cipher. The proposed method that considers a random matrix which is chosen from the length of the given input text. Here the input text is stored in the matrices which are selected with minimum cost. There on the series of operations are performed and cipher text is produced, in decryption inverse matrix is calculated and the operations are performed in order to generate the plain text. As we are using random matrix and then the inverse matrix calculation is performed which adds more security for cracking the key. Thus, the cipher text obtained is very difficult to be broken without knowing the key, which provides high security.

Original language | English |
---|---|

Title of host publication | Proceedings of the International Conference on Frontiers of Intelligent Computing |

Subtitle of host publication | Theory and Applications, FICTA 2012 |

Publisher | Springer Verlag |

Pages | 551-558 |

Number of pages | 8 |

ISBN (Print) | 9783642353130 |

DOIs | |

Publication status | Published - 01-01-2013 |

Externally published | Yes |

Event | 1st International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2012 - Bhubaneswar, Odisa, India Duration: 22-12-2012 → 23-12-2012 |

### Publication series

Name | Advances in Intelligent Systems and Computing |
---|---|

Volume | 199 AISC |

ISSN (Print) | 2194-5357 |

### Conference

Conference | 1st International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2012 |
---|---|

Country | India |

City | Bhubaneswar, Odisa |

Period | 22-12-12 → 23-12-12 |

### All Science Journal Classification (ASJC) codes

- Control and Systems Engineering
- Computer Science(all)

## Fingerprint Dive into the research topics of 'Randomized approach for block cipher encryption'. Together they form a unique fingerprint.

## Cite this

*Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications, FICTA 2012*(pp. 551-558). (Advances in Intelligent Systems and Computing; Vol. 199 AISC). Springer Verlag. https://doi.org/10.1007/978-3-642-35314-7_62