CFP last date
20 May 2024
Reseach Article

A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation

by Md. Saiful Islam Chowdhury, Shoyeb Al Mamun Shohag, Md. Hasan Sahid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 23 - Number 9
Year of Publication: 2011
Authors: Md. Saiful Islam Chowdhury, Shoyeb Al Mamun Shohag, Md. Hasan Sahid
10.5120/2979-3896

Md. Saiful Islam Chowdhury, Shoyeb Al Mamun Shohag, Md. Hasan Sahid . A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation. International Journal of Computer Applications. 23, 9 ( June 2011), 25-31. DOI=10.5120/2979-3896

@article{ 10.5120/2979-3896,
author = { Md. Saiful Islam Chowdhury, Shoyeb Al Mamun Shohag, Md. Hasan Sahid },
title = { A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation },
journal = { International Journal of Computer Applications },
issue_date = { June 2011 },
volume = { 23 },
number = { 9 },
month = { June },
year = { 2011 },
issn = { 0975-8887 },
pages = { 25-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume23/number9/2979-3896/ },
doi = { 10.5120/2979-3896 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:09:47.813575+05:30
%A Md. Saiful Islam Chowdhury
%A Shoyeb Al Mamun Shohag
%A Md. Hasan Sahid
%T A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation
%J International Journal of Computer Applications
%@ 0975-8887
%V 23
%N 9
%P 25-31
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An electronic transaction system is a set of participants and their interactions towards an efficient and secured exchange of message between the participants. A secured electronic message transaction system has been designed, developed and implemented where Hill Cipher Cryptosystem is used as the encryption-decryption process with dynamic keys. For this process, any transacted message is to be inputted into the proposed system, and then a matrix of the message length is calculated with its inverse matrix. The calculated inverse matrix is sent to the receiver where he/she used it as the key for the cryptosystem. The key matrix and the Hill Cipher technique have been used to generate the cipher text. The message digest algorithm MD5 operations have been used on the message to generate the digest of the message. The generated digest is concatenated with the encrypted message and is sent to the destination. In the receiver end, the intended receiver first computes the digest of the message by performing the message digest algorithm MD5 and compares it with the received digest that establishes the data integration and non-repudiation of the proposed system. The receiver then decrypts the received encrypted message using the Hill Cipher technique with the received inverse matrix and retrieve the message properly which establishes the message confidentiality and authentication. The proposed system has been implemented using the Java programming and analyzed for several applications. Finally, the fundamental security services have been measured and analyzed. This may be applicable for cryptographic applications.

References
  1. Andrew S. Tanenbaum, Computer Networks, 4th edition, Prentice-Hall, Inc 2003, ISBN- 81-203-2175-8, pp. 731-732, 749-755,433-437
  2. Cryptographic Algorithms: http://www.eskimo.com/ ~weidai/algorithms.html
  3. Cryptography-RSA: http://www.cs.princeton.edu/introcs/79crypto/
  4. RSA Key Generator for default keys used: http://crypto.cs.mcgill.ca/~crepeau /RSA/generator_frame.html
  5. The Hill Cipher, http://www.math.sunysb.edu/~scott/ papers/MSTP/crypto/8Hill_Cipher.html
  6. Shahrokh Saeednia, How to Make the Hill Cipher Secure, Cryptologia, 24(4), October 2000, pp353–360.
  7. "Hill Cipher Deciphered" provides an excellent explanation of computing matrix inverses with regard to the Hill cipher.
  8. An Introduction to Cryptology Prentice-Hall, ISBN 0-13-030369-0web services
  9. William Stallings, Cryptography and Network Security Principles and Practices, Fourth Edition
  10. Java Cryptography Architecture: http://www.tucows.apollo.lv/javacorner/jdk1.1.6/docs /guide/security/CryptoSpec.html
  11. Dr. Y Lee, RSA Algorithm.pdf, Telecommunication forum, UK 2001, pp.1-5
  12. James Martin, Telecommunication And The Computer,3 ed, Prentice-Hall, Englewood Cliffs, N.J., 2001, pp.29-135,137-142
  13. RSA Laboratories, http://www.rsasecurity.com/node.asp?id=1012
  14. On the Key of the Hill Cipher, http://jeff.over.bz/papers/undergrad/on-the-keyspace-of-the-hill-cipher.pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography MD5 Digital signature Hill cipher technique Plain texts Cipher text RSA FDH DSA MD4 ASCII MAC IP HASH ID