EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 2

LRUD Shift based Encryption Method using Matrices

journal image
  • International Journal of Applied Information Systems
  • Foundation of Computer Science (FCS), NY, USA
  • Volume 5 - Number 2
  • Year of Publication: 2012
  • Authors: Pankesh Bamotra
  • 10.5120/ijais12-450843
 Download
1247
  • Pankesh Bamotra 2013. LRUD Shift based Encryption Method using Matrices. International Journal of Applied Information Systems. 5, 2 (January 2013), 20-23. DOI=http://dx.doi.org/10.5120/ijais450843
  • @article{10.5120/ijais2017451568,
    author = {Pankesh Bamotra},
    title = {LRUD Shift based Encryption Method using Matrices},
    journal = {International Journal of Applied Information Systems},
    issue_date = {January 2013},
    volume = {5},
    number = {},
    month = {January},
    year = {2013},
    issn = {},
    pages = {20-23},
    numpages = {},
    url = {/archives/volume5/number2/415-0843},
    doi = { 10.5120/ijais12-450843},
    publisher = { xA9 2012 by IJAIS Journal},
    address = {}
    }
    
  • %1 450843
    %A Pankesh Bamotra
    %T LRUD Shift based Encryption Method using Matrices
    %J International Journal of Applied Information Systems
    %@ 
    %V 5
    %N 
    %P 20-23
    %D 2013
    %I  xA9 2012 by IJAIS Journal
    

Abstract

This paper deals with a novel and secure method of encryption using matrices and public key cryptography algorithm. Matrices have a very well-known property of invertibility i. e. if AX=B then X=A-1B[1]. This paper exploits this property to achieve encryption of plain text into cipher text. The idea is simple and intriguing. A non-singular integer valued square matrix Ai. e. det|A| ? 0 is taken so that A is invertible and it is possible to obtain A-1. This matrix A serves as the encryption matrix. The plain text to be encrypted is taken and ASCII values of each character is obtained and matrix X is formed such that Aq x q xD7 Xq x r= Bq x r. Before performing the multiplication of A and X to obtain cipher text ASCII value matrix B, circular shift operation is performed on rows and/ or columns of A. A single operation is stored as a string of 4 values viz. R32L9 or C8D61. The first character tells whether the circular shift operation is to be done on a row or a column. Second value tells the row or column number. Third character tells whether row is to be shifted left or right or if column is to be shifted then either up or down. The last value tells the number of times shift operation has to be performed. Successive operations are concatenated with a hyphen viz. R2R45-C6U8-C32D9 and encryption matrix A' is obtained. This key along with the matrix B' (=A'xD7X) is encrypted using RSA algorithm and sent to the other user who has the original matrix A. Receiver decrypts the message using private key, performs shift operation, finds the inverse of matrix A' as A' -1and finds A' -1xD7 B' to eventually obtain X and hence the original plain text message.

References

  1. Jin Ho Kwak and Sungpyo Hong, Linear Algebra, Second Edition
  2. Sesha Pallavi Indrakanti and P. S. Avadhani, Permutation based Image Encryption Technique, International Journal of Computer Applications (0975 – 8887), Volume 28 No. 8, August 2011
  3. William Stallings, Cryptography And Network Security, 4/E
  4. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, 2nd edition, Prentice Hall

Keywords

Encryption, matrices,circular shift, RSA

Index Terms

Computer Science
Information Sciences