{"title":"提出了一种基于矩阵属性的数据安全加密算法","authors":"Deeksha Priya Jha, Rashi Kohli, Archana Gupta","doi":"10.1109/ICICCS.2016.7542316","DOIUrl":null,"url":null,"abstract":"Cryptography is used widely for the purpose of secure communication and password management. It comprises the techniques of encryption and decryption mechanism. Using the encryption mechanism a plaintext is converted into a cipher text and in decryption with the help of a secure key the encrypted message is decoded into a plain text. Mathematical principles can be employed for encryption determinants to encrypt and decrypt our message and to transmit them securely. In this paper we are using principles of Caesar cipher and Hill Cipher and developing an encryption and decryption algorithm to make transmission of messages secure from eavesdropping.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Proposed encryption algorithm for data security using matrix properties\",\"authors\":\"Deeksha Priya Jha, Rashi Kohli, Archana Gupta\",\"doi\":\"10.1109/ICICCS.2016.7542316\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cryptography is used widely for the purpose of secure communication and password management. It comprises the techniques of encryption and decryption mechanism. Using the encryption mechanism a plaintext is converted into a cipher text and in decryption with the help of a secure key the encrypted message is decoded into a plain text. Mathematical principles can be employed for encryption determinants to encrypt and decrypt our message and to transmit them securely. In this paper we are using principles of Caesar cipher and Hill Cipher and developing an encryption and decryption algorithm to make transmission of messages secure from eavesdropping.\",\"PeriodicalId\":389065,\"journal\":{\"name\":\"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)\",\"volume\":\"103 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICCS.2016.7542316\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICCS.2016.7542316","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Proposed encryption algorithm for data security using matrix properties
Cryptography is used widely for the purpose of secure communication and password management. It comprises the techniques of encryption and decryption mechanism. Using the encryption mechanism a plaintext is converted into a cipher text and in decryption with the help of a secure key the encrypted message is decoded into a plain text. Mathematical principles can be employed for encryption determinants to encrypt and decrypt our message and to transmit them securely. In this paper we are using principles of Caesar cipher and Hill Cipher and developing an encryption and decryption algorithm to make transmission of messages secure from eavesdropping.