Data security is an essential component of an organization in order to keep the information safe from various competitors. Cryptography is a technique used to avoid unauthorized access of data. It has two main components- Encryption algorithm and Key. Sometime, multiple keys can also be used for encryption. A number of cryptographic algorithms are available in market such as DES, AES, TDES and RSA. The strength of these encryption algorithms depends upon their key strength. The long key length takes more computing time to crack the code and it becomes difficult for the hacker to detect the cryptographic model. In this paper we suggest an innovation in the age-old conventional cryptographic technique of HILL-CIPHER using the concept of self repetitive matrix. A numerical method has been stated, mathematically proved and later implemented in generating a random matrix of given periodicity. The method of self-repetitive matrix has then been used to simulate a communication channel with proper decompression techniques to facilitate bit saving.
Introduction
I. INTRODUCTION
In today’s world cryptography has become a necessity for all the organizations. Data security is an essential component of an organization in order to keep the information safe from various competitors. It also helps to ensure the privacy of a user from others. These days’ passwords are not considered as reliable for this task because it is easy to guess passwords due to its short range. Moreover, if the range of password is small a brute force search can be applied to crack it [3]. So, as to protect our data various algorithms have been designed. It helps us to securely access bank accounts, electronic transfer of funds and many more daily life applications.
Cryptography [1] is a technique used to avoid unauthorized access of data. It has two main components; a) Encryption algorithm, and b) Key. Sometime, multiple keys can also be used for encryption. A number of cryptographic algorithms are available in market such as DES, AES, TDES and RSA. The strength of these encryption algorithms depends upon their key strength. Strong encryption algorithms and optimized key management techniques always help in achieving confidentiality, authentication and integrity of data and reduce the overheads of the system.
Cryptography is basically divided into two categories [2]; a) Symmetric Cryptography, and b) Asymmetric Cryptography. In symmetric cryptography the key used to encrypt the message is the same as the key decrypting the message whereas in asymmetric cryptography different key is used for encryption and decryption.
The work presented in this paper aims at the following aspects.
• Develop a new hybrid technique for improving the security using encryption and decryption algorithms.
• Compare the various techniques at hand with the proposed system.
• Build a system that delivers optimal performance both in terms of speed and accuracy.
II. OVERVIEW OF WORK
The core of Hill-cipher [3] is matrix manipulations. It is a multi-letter cipher, developed by the mathematician Lester Hill in 1929. For encryption, algorithm takes m successive plaintext letters and instead of that substitutes m cipher letters. In Hill cipher each character is assigned a numerical value like:
Conclusion
Cryptography provides solution for data integrity, authentication and non-reproduction. The Hill cipher technique using a novel method of self-repetitive matrix and it has been successfully implemented. From the experimental results it has been shown that the modified Hill Cipher is easy to implement and difficult to crack. This technique becomes more secure by using modular arithmetic. The block size which is specified as 64 bit is expandable as per requirement, thus gives flexibility in message string length. It generates key of 56 bits which is enhance the security aspect of this algorithm and make them more secure than other encryption algorithms. Due to the following facts it has been concluded that it takes very less time for execution as compare to other Hill Cipher algorithm. Using the Hill Cipher, performance will be appropriate in much kind of applications where it is suitable. The proposed algorithm has been compared with other algorithms and found that throughput of proposed algorithm is greater than other encryption algorithms. Future work will be carried out to decrease the complexity of the proposed algorithm.
References
[1] W. Stallings; “Cryptography and Network Security” 2nd Edition, Prentice Hall,1999
[2] Bruce Schneir: Applied Cryptography, 2nd edition, John Wiley & Sons, 1996
[3] M. Alqdah and L.Y. Hui, “Simple Encryption and Decryption Algorithm” International Journal of Computer Science and Security, Vol. 1, pp. 14-17, 2008.
[4] A. Kakkar, P.K. Bansal, “Reliable Encryption Algorithm used for Communication”, M. E. Thesis, Thapar University, 2004.
[5] D. R. Stinson, “Cryptography Theory and Practice”, 3rd edition Chapman Hall, Vol. 1, pp. 13-37, 2006.
[6] Lester. S. Hill, “Cryptography in an algebraic alphabet”, Amer. Math, Vol. 1, pp. 306-312, 1936.
[7] B. Acharya, S. K. Panigrahy, S. K. Patra and G. Panda, “Image Encryption Using Advanced Hill Cipher Algorithm”, International Journal of Recent Trends in Engineering, Vol. 1, No. 1, pp. 663-667, 2009.
[8] D. Anand, V. Khemchandani and R. K. Sharma, “Identity Based Cryptography Techniques and Applications”, International Conference on Computational Intelligence and Communication Networks, Vol. 1, pp. 343-348, 2013.
[9] S. F. Mare, M. Vladutiu and L. Prodan, “Secret data communication system using Steganography, AES and RSA”, International Symposium for Design and Technology in Electronic Packaging, Vol. 2, pp. 339-344, 2011.
[10] S. Khar, N. Bhargawa, R. Shukla and M. Shukla, “Implementation and Enhanced Modified Hill Cipher by P-box and M-box technique”, International Journal of Information Technology and Knowledge Management , Vol. 5, No.1, pp. 53-58, 2012.
[11] Pavan. N, Nagarjun G. A, Nihaar N, G. S Gaonkar and P. Sharma, “Image Steganography Based On Hill Cipher with Key Hiding Technique”, IOSR Journal of Computer Engineering, Vol. 11, pp. 47-50, 2013.
[12] K. R. Saraf, V. P. Jagtap, A. K. Mishra, “Text and Image Encryption Decryption Using Advanced Encryption Standard”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) Volume 3, Issue 3, May – June 2014.
[13] S. Desai, C. A. Mudholkar, R. Khade, P. Chilwant, “Image Encryption and Decryption using Blowfish Algorithm”, International Journal of Electrical and Electronics Engineers IJEEE, Volume 07, Issue 01, June 2015.