Citation
Abstract
A cryptography system was developed previously based on Cipher Polygraphic Polyfunction transformations, C(t)i×j≡Ati×iPi×jmodN where Ci×j , Pi×j , Ai×i are cipher text, plain text, and encryption key, respectively. Whereas, (t) is the number of transformations of plain text to cipher text. In this system, the parameters ( Ai×i,(t) ) are kept in secret by a sender of messages. The security of this system, including its combination with the second order linear recurrence Lucas sequence (LUC) and the Ron Rivest, Adi Shamir and Leonard Adleman (RSA) method, until now is being upgraded by some researchers. The studies found that there is some type of self-invertible A4×4 should be not chosen before transforming a plain text to cipher text in order to enhance the security of Cipher Tetragraphic Trifunction. This paper also seeks to obtain some patterns of self-invertible keys A6×6 and subsequently examine their effect on the system of Cipher Hexagraphic Polyfunction transformation. For that purpose, we need to find some solutions L3×3 for L23×3≡A3×3modN when A3×3 are diagonal and symmetric matrices and subsequently implement the key L3×3 to get the pattern of A6×6 .
Download File
Official URL or Download Paper: https://www.mdpi.com/2410-387X/3/2/15
|
Additional Metadata
Item Type: | Article |
---|---|
Divisions: | Faculty of Science Institute for Mathematical Research |
DOI Number: | https://doi.org/10.3390/cryptography3020015 |
Publisher: | MDPI |
Keywords: | Cipher polygraphic; Hill cipher; Self-invertible matrix; RSA; LUC |
Depositing User: | Nabilah Mustapa |
Date Deposited: | 04 May 2020 16:22 |
Last Modified: | 04 May 2020 16:22 |
Altmetrics: | http://www.altmetric.com/details.php?domain=psasir.upm.edu.my&doi=10.3390/cryptography3020015 |
URI: | http://psasir.upm.edu.my/id/eprint/38355 |
Statistic Details: | View Download Statistic |
Actions (login required)
View Item |