Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supported With Modular Arithmetic Addition

Print
PDF
International Journal of Computer Applications
© 2012 by IJCA Journal
Volume 55 - Number 16
Year of Publication: 2012
Authors:
V. U. K. Sastry
K. Shirisha
10.5120/8838-3063

V U K Sastry and K Shirisha. Article: A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supported With Modular Arithmetic Addition. International Journal of Computer Applications 55(16):11-14, October 2012. Full text available. BibTeX

@article{key:article,
	author = {V. U. K. Sastry and K. Shirisha},
	title = {Article: A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supported With Modular Arithmetic Addition},
	journal = {International Journal of Computer Applications},
	year = {2012},
	volume = {55},
	number = {16},
	pages = {11-14},
	month = {October},
	note = {Full text available}
}

Abstract

In this paper, we have developed a block cipher, by using a key bunch matrix and an additional key matrix. In order to carry out the decryption process, the decryption key bunch matrix is obtained, basing upon the encryption key bunch matrix, on using the concept of multiplicative inverse. In the cryptanalysis, we have found that, this cipher is a very strong one as it includes the additional key matrix and supported with modular arithmetic addition. From the viewpoint of efficiency and strength, this cipher is quite comparable with any other cipher available in the literature of cryptography.

References

  • V. U. K. Sastry, K. Shirisha, "A Novel Block Cipher Involving a Key Bunch Matrix" sent for publication.
  • V. U. K. Sastry, K. Shirisha, "A Block Cipher Involving a Key Bunch Matrix and Including another Key Matrix Supplemented with Xor Operation" sent for publication.
  • William Stallings, "Cryptography and Network Security: Principle and Practices", Third Edition 2003, Chapter 2, pp. 29.