scholarly journals A Fingerprint Pattern Approach to Hill Cipher Implementation

2017 ◽  
Author(s):  
Andysah Putera Utama Siahaan

The human fingerprint always becomes the way to verify the originality of the ownership. It can be connected to the security methods to increase the security level. Hill Cipher in one of the cryptography algorithms that can attach the digital fingerprint pattern. There are several matrix sizes to implement its process. This study focuses to a 3 x 3 matrix in the application. It provides nine integer numbers to perform the encryption which determinant has already been tested before. The concept is to link the digital fingerprint pattern to produce the automatic key generator. Not all the determinant value can get the ciphertext back to the original message. A threshold is used to adjust the determinant. It produces the different numbers when to be shifted. The correct numbers will be occupied in the matrix. When the numbers are available, the cryptography process can be performed.

2003 ◽  
Vol 15 (3) ◽  
pp. 161-166 ◽  
Author(s):  
Anne P. Crick

Tourism is the mainstay of the Caribbean and the attitude of the people in the region may have a significant impact on the success of the industry. This paper analyzes the way in which tourism authorities of three Caribbean destinations have internally marketed tourism to their host populations in order to encourage the desired attitudinal expressions. A matrix of five possible responses to tourism was developed and each of the three countries was found to occupy different positions in the matrix. An analysis of the internal marketing strategies determined that the countries adopted different approaches based on their particular challenges but none of the approaches had achieved lasting success. The study concludes with recommendations for future research.


2017 ◽  
Author(s):  
hasdiana

This preprint has been presented in the 3rd International Conference on Multidisciplinary Research, Medan, october 16 – 18, 2014---In this study the authors use the scheme of Shamir's Three Pass Protocol for Hill Cipher operation. Scheme of Shamir's Three Pass Protocol is an attractive scheme that allows senders and receivers to communicate without the key exchange. Hill Cipher is chosen because of the key-shaped matrix, which is expected to complicate the various techniques of cryptanalyst. The results of this study indicate that the weakness of the scheme of Shamir's Three Pass Protocol for XOR operation is not fully valid if it is used for Hill Cipher operations. Cryptanalyst can utilize only the third ciphertext that invertible. Matrix transpose techniques in the ciphertext aims to difficulties in solving this algorithm. The original ciphertext generated in each process is different from the transmitted ciphertext. The level of difficulty increases due to the use of larger key matrix. The amount of time required for the execution of the program depends on the length of the plaintext and the value of the matrix element. Plaintext has the same length produce different execution time depending on the value of the key elements of the matrix used.


2020 ◽  
Vol 20 (1) ◽  
pp. 15
Author(s):  
Dwi Rahmasari Kinasih Gusti ◽  
Kiswara Agung Santoso ◽  
Ahmad Kamsyakawuni

Cryptography is knowledge of encoding messages by observe to security aspects. Cryptography uses two types of keys, namely symmetric keys and asymmetric keys. Vigenere cipher is a technique to encrypt messages by symmetric key. Vigenere cipher can be combined by several patterns and ASCII code. The pattern used can vary as long as the text can be returned to original message (can be decrypted). On this paper, we will modified plaintext before encrypt using vigenere cipher. The way to modified the plaintext are flip and shift rows of bit. The effect of the algorithm changes can be seen based on the renewal value obtained. If the correlation value gets smaller, it means the algorithm is better. The results of this study is the correlation value using vigenere cipher with modified plaintext is better compared to vigenere cipher with original plaintext. Keywords: ASCII, Patterned, Bits, Vigenere Cipher


This article explores narrative organisation of the event in the literary story Nunc dimittis by T. Lee and the screen version of the same name. The event in its entirety of concrete episodes is a change of states with the known and the unknown confronting each other throughout the whole narrative. The character of the known side is a young criminal, while a female vampire and her servant stand for the unknown. The literary story and its screen version (the filmic narrative) are brought to comparison in terms of the authentic retranslation that reproduces the original event in another (cinematic) medium in detail, but with minor fluctuations seen in each episode separately. In the article, the mode of retranslation is shown according to the pattern the original – a transponent, where the original is the initial, primary work, and transponents are the products of intermedial, or extracompositional reinterpretation (in this article the only existing screen version is at issue). All adaptations, notwithstanding their number, make up the matrix of a certain narrative together with the original. The literary as well as the filmic episodes of Nunc dimittis resolve into three types of mise en scène where the latter term is defined as the elements that make up the event. The types suggested include the enclosed mise en scène keeping all the participants inside up to its end; the pass-through mise en scène that adheres to one of the characters who is in and out; the open mise en scène where the characters take turns in coming and going. Minor differences between the original and its transponent concern the symbolic load on the names of characters and their actions, which do not change, but rather amplify the original message of the story.


2017 ◽  
Vol 22 ◽  
pp. 121-127
Author(s):  
Dar'ya Pilova

Formation procedure of economic security of ore-mining and processing enterprises including availability factor of the task, is substantiated. The availability factor of the task to ship products is determined. The way of impact of the factors that determine the volume of major products of mining and processing enterprise is analyzed.


1998 ◽  
Vol 91 (3) ◽  
pp. 240-244
Author(s):  
Dennis St. John

Throughout history, coded messages have been used for various reasons. Today's students are fascinated by the secretive nature of these codes, and this fascination can lead them to explore the mathematics of cryptography. The simplest codes are called substitution ciphers. In these codes, each letter is replaced by another number or letter in the alphabet. These codes are easy to crack, or decode, because of the relative frequency of letters in messages. For example, e is the most often used letter in the English language; therefore, the substituted value for e is relatively easy to determine. One way to make substitution codes more difficult to crack is to group letters and then encode the groups of letters. A particular application of this strategy, one that combines matrix multiplication and modular arithmetic, is known as the Hill cipher (Anton and Rorres 1987). This article explains coding and decoding messages using Hill ciphers. These ciphers are an interesting example of an application of matrices called for in NCTM's Curriculum and Evaluation Standards for School Mathematics (NCTM 1989) for grades 9-12. A graphing calculator will facilitate the matrix and modular arithmetic used in the coding and decoding procedures.


2009 ◽  
Vol 21 (5) ◽  
pp. 1415-1433 ◽  
Author(s):  
P.-A. Absil ◽  
M. Ishteva ◽  
L. De Lathauwer ◽  
S. Van Huffel

Newton's method for solving the matrix equation [Formula: see text] runs up against the fact that its zeros are not isolated. This is due to a symmetry of F by the action of the orthogonal group. We show how differential-geometric techniques can be exploited to remove this symmetry and obtain a “geometric” Newton algorithm that finds the zeros of F. The geometric Newton method does not suffer from the degeneracy issue that stands in the way of the original Newton method.


1996 ◽  
Vol 5 (2) ◽  
pp. 79-92 ◽  
Author(s):  
Peter Crisp

Imagism is centered on the image metaphor, and so is a valuable resource for studying this kind of metaphor. Image metaphor raises questions for any theory that sees metaphor as something conceptual. Such theories entail the rejection of truth-conditional semantics and are thus rejected by proponents of truth conditionalism, such as Donald Davidson. Imagism embodies an extreme form of image metaphor that avoids generating any clear propositional entailments. The problem it poses for conceptual theories of metaphor is thus considerable. The solution lies in the concept of the image schema as the basis of propositional reasoning. Image metaphor can be seen as displaying the matrix out of which conceptual metaphor proper itself develops. Image metaphor shows that matrix to be bound up with the nature of aesthetic affect. It thus points the way to a view of poetry that does justice to its aesthetic passion without opposing it in some absolute way to the rationality of logic and science.


Author(s):  
Josef Holoubek ◽  
Petr Zach

When solving operations research problems, one can use either specialised computer programs such as Lingo, Lindo, Storm or more universal programs such Excel, Matlab, and R. To obtain the input data, one can use either a program’s own editor or other programs commonly available such as Excel. While the problem-solving methods, being part of various programs, are the subjects of numerous publications (such as Gros, 2003; Jablonský, 2002; Plevný – Žižka, 2007; Stevenson – Ozgur, 2009), the way the input data are obtained, recorded, and processed receives far less attention although this part of problem-solving requires considerable effort and, if the method for data recording is inadequate, may cause subsequent difficulties in their further processing. A problem known as “the travelling salesman problem” (TSP) may serve as an example. Here, the input data form a “square matrix of distances”. This paper is concerned with some Excel tools that can be used to obtain and subsequently modify such a square matrix. Given a square m × m matrix, an ordinary user might want to reduce it to an i × i square matrix (where i < m) without having to copy data from the matrix, skip some of its rows and/or columns or write a program to implement such a reduction.In her degree project, Kourková, 2009 was looking for an efficient method of reducing an Excel matrix. She had found no relevant papers on this subject concluding that the authors of the commercial program had not considered this. Therefore, she offered her own solution unconventionally using the contingency table menu option. Although this had resulted in the desired submatrix, some of its parts were superfluous and even baffling for the user.For this reason, the authors analyse the method of representing an m × m matrix and the way of its reduction. Finally, a better option is offered to achieve the desired objective as well as other methods of obtaining the required submatrix that even users without sufficient programming skills can use.


2018 ◽  
Author(s):  
Andysah Putera Utama Siahaan

Computer security aims to help users prevent fraud or detect fraud in an information-based system. The information must be secured to be free from threats. Cryptographic techniques can prevent data theft. One cryptographic algorithm is Hill Cipher. This algorithm is one symmetric cryptography algorithm. The Hill Cipher algorithm uses an m x m sized matrix as the key to encryption and decryption. The fundamental matrix theory used in Hill Cipher is multiplication between matrices and inverses the matrix. Hill Cipher has two types of matrices in general, 2 x 2 and 3 x 3. This study discusses the order 2 x 2. The application of Hill Cipher in text-shaped media is highly recommended because it has fast encryption and decryption speeds. This method is very good at securing data that will be transmitted on an open network.


Sign in / Sign up

Export Citation Format

Share Document