scholarly journals Unimodular matrix and bernoulli map on text encryption algorithm using python

2021 ◽  
Vol 12 (2) ◽  
pp. 447-455
Author(s):  
Samsul Arifin ◽  
Indra Bayu Muktyas ◽  
Puguh Wahyu Prasetyo ◽  
Abdul Azis Abdillah

One of the encryption algorithms is the Hill Cipher. The square key matrix in the Hill Cipher method must have an inverse modulo. The unimodular matrix is one of the few matrices that must have an inverse. A unimodular matrix can be utilized as a key in the encryption process. This research aims to demonstrate that there is another approach to protect text message data. Symmetric cryptography is the sort of encryption utilized. A Bernoulli Map is used to create a unimodular matrix. To begin, the researchers use an identity matrix to generate a unimodular matrix. The Bernoulli Map series of real values in (0,1) is translated to integers between 0 and 255. The numbers are then inserted into the unimodular matrix's top triangular entries. To acquire the full matrix as the key, the researchers utilize Elementary Row Operations. The data is then encrypted using modulo matrix multiplication.

Author(s):  
Azzam Mujaddid ◽  
Sumarsono Sumarsono

The hill cipher algorithm has the uniqueness of using matrix multiplication in the process where the key used is a matrix that has weaknesses in the process of encryption and decryption. In this paper will be modified to the encryption process with caesar cipher substitution. The principle of the hill cipher algorithm using the multiplication of the 2x2 key matrix of keys is enhanced through process modification lies in the combination of initial character determination using the substitution of 3 caesar ciphers. From the results of this modification can be seen that the more the number of characters processed the time required will be longer. The magnitude of the determinant also affects time and size during the poses. A 1 character increment occurs if the initial character of the encryption process is an odd number.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Computer security aims to help users prevent fraud or detect fraud in an information-based system. The information must be secured to be free from threats. Cryptographic techniques can prevent data theft. One cryptographic algorithm is Hill Cipher. This algorithm is one symmetric cryptography algorithm. The Hill Cipher algorithm uses an m x m sized matrix as the key to encryption and decryption. The fundamental matrix theory used in Hill Cipher is multiplication between matrices and inverses the matrix. Hill Cipher has two types of matrices in general, 2 x 2 and 3 x 3. This study discusses the order 2 x 2. The application of Hill Cipher in text-shaped media is highly recommended because it has fast encryption and decryption speeds. This method is very good at securing data that will be transmitted on an open network.


Author(s):  
Ommi Alfina

With the increasingly widespread abuse of digital media, especially in the form of images or images, it increasingly disrupts the rights and privacy of everyone. Many forms of abuse that occur in digital media through internet facilities such as plagiarism of photographer's work, recognition of the rights of the image, to upload photos of privacy to internet media. Therefore, one way to secure digital data in the form of images is to randomize (encrypt) the images that we feel are very important so that the image can no longer be interpreted by others. If we need these data, we just need to return it (decryption) so that the encryption image can return to its original form. Hill Cipher algorithm is one method to randomize a data by encoding and multiplying the matrix. For its application in the form of image data, a trial is needed by creating a software which will then analyze the results into several color models such as RGB, Grayscale (Keabuan) and Tresholding (Black and White). From the test results, it can be concluded that the greater the input matrix value of the Hill Cipher Algorithm, the more encrypted image results will be obtained or in other words the more incomprehensible the visual form by humans. Then the Hill Cipher algorithm cannot be applied to the color threshold model (black and white) because the matrix multiplication obtained does not have a diverse range of values


2021 ◽  
Vol 3 (3) ◽  
pp. 57-62
Author(s):  
Fausto Abraham Jacques García ◽  
Sandra Luz Canchola Magdaleno ◽  
Gloria Nelida Avecilla Ramírez

El presente artículo describe la enseñanza de las matrices inversas modulares usando el algoritmo de criptografía simétrica Hill Cipher y su implementación en dispositivos móviles con Sistema operativo Android. El proceso de descifrado en el algoritmo Hill Cipher involucra el cálculo de matrices inversas modulares. El objetivo de este trabajo es la enseñanza del cálculo necesario para la obtención de matrices inversas modulares a estudiantes de licenciatura en las áreas de las ciencias computacionales a través del proceso de descifrado en la criptografía simétrica. Se realizó un experimento con dos grupos de estudiantes, el grupo experimental y el grupo de control. Se aplicó una prueba en ambos grupos para determinar el aprendizaje de los estudiantes. Un análisis comparativo entre ambos grupos muestra un incremento en el desempeño del grupo experimental en el cálculo de las matrices inversas modulares. This article describes the teaching of modular inverse matrices with the symmetric cryptographic algorithm Hill Cipher and its implementation on mobile devices with Android Operative System. The decryption in the Hill Cipher algorithm involves the calculus of modular inverse matrices. The goal of this paper is the teaching of modular inverse matrix calculation to undergraduate students of Computer Sciences through the decryption in symmetric cryptography. An experiment was conducted on two groups of students, the control and the experimental groups. To measure student learning, a test was applied to both groups. Comparison of control and experimental groups results show an increase in student performance for the calculation of modular inverse matrices.  


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


Author(s):  
Dian Rachmawati ◽  
Mohammad Andri Budiman ◽  
Wiro Tirta Habibi
Keyword(s):  

2020 ◽  
Vol 8 (6) ◽  
pp. 5759-5764

Given the current use of the Internet, The most important thing is to provide security to the user's information. Many encryption algorithms already exist for this purpose. Here we discussed a new process called Mahaviracharya Encryption Standard. MES is a symmetric encryption algorithm. Here, this algorithm is cryptanalyzed, and compared with blowfish algorithm. MES algorithm can be used instead off algorithms like AES, Blowfish etc.


2017 ◽  
Vol 4 ◽  
pp. 82-86
Author(s):  
Dawid Górniak ◽  
Piotr Kopniak

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.


2008 ◽  
Vol 9 (2) ◽  
pp. 211-214 ◽  
Author(s):  
Y. Rangel-Romero ◽  
R. Vega-García ◽  
A. Menchaca-Méndez ◽  
D. Acoltzi-Cervantes ◽  
L. Martínez-Ramos ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document