SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. IV(Jan – Feb. 2016), PP 19-22
www.iosrjournals.org
DOI: 10.9790/0661-18141922 www.iosrjournals.org 19 | Page
An Efficient And Secure Cryptography Techniques
Usingunimodular Matrix
ApurvaK.Vangujar1
, Kajal Agrawal2
1
Student of BE CSE: Dept of Computer Science & Engineering, Jawaharlal Nehru Engineering College
Aurangabad, Maharashtra 431003, and India
2
Student of ME CSE: Dept of Computer Science & Engineering, Jawaharlal Nehru Engineering College,
Aurangabad, Maharashtra 431003, and India
Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult.
"Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is
one of the best techniques for the secure data transmission. Confidentiality of data, access control and non-
repudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of
Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption.
Therefore, access control, non-repudiation and confidentiality of data is maintained.
Keywords: cryptography, decryption, encryption, unimodular matrix, Armstrong numbers
I. Introduction
Security is more important to ensure the confidentiality of data. Sending a data from one node to
another node with security is most difficult. There are several techniques are followed for secure data
transmission.
Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data,
access control and non-repudiation are the main goals of cryptography.Cryptography consists of two processes
that is encryption and decryption. Encryption and decryptionconsists of the key, i.e. some secret information.
Encryption is the process in which plain text, convertsinto cipher text. And cipher text converts into plain text is
knows as decryption process. The same key and different key are used for encryption and decryption .The same
key might be used for both encryption and decryption depending on the encryption mechanism. While for other
mechanisms, the keys used for encryption and decryption might be different.[1], [2], [3]
There are many encryption algorithm processes like AES, DES, RSA in which encryption is done with
help of substitutions and transformation on plain text. It uses Armstrong numbers.
1. Cryptography using secret key (SKC):secrete key is a value independent of a plain text and of the
algorithm. Single key is used for encryption and decryption by an algorithm. It includes of advance
encryption standard (AES) and data encryption standard (DES)[4].
2. Cryptography using public key (PKC): two different keys are used in this cryptography. One key is used for
encryption and another is used for decryption[4].
3. Hash function:It uses mathematical transformation for encryption which is not recoverable from the cipher
text[4].
II. Literature Survey
The protection afforded to an automated information system in order to attain the applicable objectives
of preserving the integrity, availability, and confidentiality of information system resources (includes hardware,
software, firmware, information/ data, and telecommunications) [3]
This definition introduces three key objectives that are at the heart of computer security:
 Confidentiality: This term covers two related concepts:
 Data confidentiality: Assures that private or confidential information is not made available or disclosed to
unauthorized individuals.
 Privacy: Assures that individuals control or influence what information related to them may be collected
and stored and by whom and to whom that information may be disclosed.
 Integrity: This term covers two related concepts:
 Data integrity: Assures that information and programs are changed only in a specified and authorized
manner.
 System integrity: Assures that a system performs its intended function in an unimpaired manner, free from
deliberate or inadvertent unauthorized manipulation of the system.
An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
DOI: 10.9790/0661-18141922 www.iosrjournals.org 20 | Page
Availability: Assures that systems work promprolyandservice is not denied to authorize users.
Proposed System
Fig. 1 proposed system architecture
There many techniques used for the secure communication. In our system, Armstrong numbers are
used for the secure communication. Proposed method uses unimodular matrix for the encryption.As shown in
the above diagram our proposed system will work. Here we are using cryptographic algorithm for encryption
and decryption using Armstrong numbers[1]. These are carried out by performing substitutions and
transformation of matrix. This technique uses Armstrong no. as same key for both encryption and decryption
purposes. Therefore, it is symmetric key cryptography[5], [6].
Encryption algorithm
It is the cryptographic technique to convert plain text into cipher text by performing substitution and
transformation on message character. This is performed by sender site by using some secret key.
Step 1:convert characters of secrete message into their ASCII equivalent. Consider message to be send is
ENCRYPT
E N C R Y P T - -
69 78 67 82 89 80 84 -25 -25
Step 2: convert data into matrix form
69 78 67
82 89 80
P = 84 -25 -25
Step 3: Select any Armstrong number and calculate encoding matrix by using a unimodular matrix technique as
follow:
8n2
+8n 2n+1 4n
4n2
+4n n+1 2n+1
4n2
+4n+1 n 2n-1
Where n = sum of Armstrong number
Consider if Armstrong number = 370
n = 3 + 7 + 0 = 10
An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
DOI: 10.9790/0661-18141922 www.iosrjournals.org 21 | Page
Encoding matrix will be
880 21 40
440 11 21
E= 441 10 19
Step 4: Multiply encoding matrix E with data matrix P and resultant matrix will be P that is encrypted matrix
880 21 40 69 78 67
C= 440 1121 * 82 89 80
441 10 19 84 -25 -25
65802 69509 59640
C = 33026 34774 29835
32845 34813 29872
Step 5: convert the resultant values in the form of string
65802, 69509, 59640, 33026, 34774, 29835, 32845, 34813, 29872
This is the cipher text generated which will be send to receiver and he/she will be able to read original message
only after decryption.
1. Decryption Algorithm :
Decryption is the cryptographic bezique used to convert cipher text into plain text. It is performed by using
secrete key which may be same as used in the encryption process or it may be different. In our system we are
using same key for encryption and decryption purpose[7].
Step 1: convert the received cipher text into matrix form
65802 69509 59640
C = 33026 34774 29835
32845 34813 29872
Step 2: calculate the inverse of encoding matrix E for decryption matrix D using mathematical formula.
-1 1 1
D = 901 -920 -88
-451 461 440
65802 69509 59640 -1 1 1
D*C = 33026 34774 29835 * 901 -920 -880
32845 34813 29872 -451 461 440
69 78 67
D*C= 82 89 80
84 -25 -25
Step 3: Now resultant matrix containing the ASCII values for the alphabets in message. So, convert matrix into
string.
69, 78, 67, 82, 89, 80, 84, -25, -25
Step 5: convert ASCII values into equivalent.
An Efficient And Secure Cryptography Techniques Usingunimodular Matrix
DOI: 10.9790/0661-18141922 www.iosrjournals.org 22 | Page
69 78 67 82 89 80 84 -25 -25
E N C R Y P T - -
This is original message send by sender and now decryption is done successfully.Reciever is able to read
message[2], [8].
Previously we were using concepts Armstrong numbers with some algorithm .But this technique was
having limitations. Because values are private keys of user it should not be known to other users. Another
limitation was about Armstrong no. The technique which was used was not useful for decryption. This is
because if Armstrong no contains 0 then inverse of encoding matrix is not possible which is required for
decryption.Now we have overcome this limitation by using concept of unimodular matrix. Message length
restrictions have also overcome using unimodular matrix[6].
III. Anyalsis And Result
The above technique involves keys with a minimum key length which reduces the efforts taken to
encrypt the data. The key length can be increased if needed, with increase in character length. This increases the
complexity thereby providing increased security[2].
A unimodular matrix is matrix with real square with its determinant det (A) = {-1, 0, 1}[6]
This technique ensures that the data transfer can be performed with protection since it involves two
main steps. First step is to convert the characters into another form that means in ASCII values, Second step by
adding with the digits of the Encoding matrix to form the required encrypted data using unimodular matrix.
Tracing process becomes difficult with this technique[8].
This is because data is encrypted by key usingArmstrong number and again this Armstrong number is
encrypted by using as key. So it is more secure.In this proposed technique encryption algorithm is too difficult
to trace or hack externally[9].
IV. Conclusion
The above combination of secret key and public key cryptography can be applied mainly in military
where data security is given more importance. This technique provides more security with increase in key length
of the Armstrong numbers[3]. Thus usage of three set of keys namely colors, additional set of key values and
Armstrong numbers in this technique ensures that the data is transmitted securely and accessed only by
authorized people[10], [2].
References
[1]. Ajmal, K., et al. Security using Colors, Figures and Images. in International Conference on Emerging Technology Trends on
Advanced Engineering Research (ICETT’12) Proceedings published by International Journal of Computer Applications (IJCA).
2012.
[2]. Belose, S., M. Malekar, and G. Dharmawat, Data Security Using Armstrong Numbers. International Journal of Emerging
Technology and Advanced Engineering. ISSN, 2012: p. 2250-2459.
[3]. Stallings, W., Cryptography and Network Security, 4/E. 2006: Pearson Education India.
[4]. Anoop, M., Public key Cryptography-applications Algorithms and Mathematical Explanations. Tata Elxsi Ltd, India, 2007.
[5]. Rescorla, E., Diffie-Hellman key agreement method. 1999.
[6]. Weisstein, E.W., Unimodular matrix. 2003.
[7]. Cormen, T.H., et al., Introduction to algorithms. Vol. 6. 2001: MIT press Cambridge.
[8]. Deepa, S.P., S. Kannimuthu, and V. Keerthika. Security using colors and Armstrong numbers. in Innovations in Emerging
Technology (NCOIET), 2011 National Conference on. 2011. IEEE.
[9]. Bansode, A., et al., Data Security in Message Passing using Armstrong Number.
[10]. Saoji, S., et al., Securing e-mails in XML format using colors and Armstrong numbers. International Journal of Scientific &
Engineering Research, ISSN, 2013: p. 2229-5518.

More Related Content

What's hot

Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingeSAT Journals
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based serviceseSAT Journals
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...ijistjournal
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreIJMER
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesIJERA Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...IJNSA Journal
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling saltingMauryasuraj98
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYJournal For Research
 

What's hot (20)

Js2517181724
Js2517181724Js2517181724
Js2517181724
 
Classification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computingClassification of secure encrypted relationaldata in cloud computing
Classification of secure encrypted relationaldata in cloud computing
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
Coding Instead of Encryption
Coding Instead of EncryptionCoding Instead of Encryption
Coding Instead of Encryption
 
Ft3111351140
Ft3111351140Ft3111351140
Ft3111351140
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
An improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based servicesAn improved geo encryption algorithm in location based services
An improved geo encryption algorithm in location based services
 
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
PERFORMANCE ANALYSIS OF PARALLEL IMPLEMENTATION OF ADVANCED ENCRYPTION STANDA...
 
Implementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure CoreImplementation of Cryptography Architecture with High Secure Core
Implementation of Cryptography Architecture with High Secure Core
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
A NOVEL DATA ENCRYPTION TECHNIQUE BY GENETIC CROSSOVER OF ROBUST BIOMETRIC KE...
 
Image encryption using jumbling salting
Image encryption using jumbling saltingImage encryption using jumbling salting
Image encryption using jumbling salting
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHYAN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
AN INNOVATIVE IDEA FOR PUBLIC KEY METHOD OF STEGANOGRAPHY
 
H43064650
H43064650H43064650
H43064650
 

Viewers also liked

Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)Ashok Reddy
 
ホッケ資源急減の要因と資源管理について
ホッケ資源急減の要因と資源管理についてホッケ資源急減の要因と資源管理について
ホッケ資源急減の要因と資源管理についてDaichi Kurokawa
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.comGudeer Kitty
 
Urus Izin Prinsip Perubahan – PMA / PMDN
Urus Izin Prinsip Perubahan – PMA / PMDNUrus Izin Prinsip Perubahan – PMA / PMDN
Urus Izin Prinsip Perubahan – PMA / PMDNlegalservice
 
Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)
Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)
Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)legalservice
 
A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...
A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...
A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...IOSR Journals
 
An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...
An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...
An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...IOSR Journals
 
Radiation Response of Bacteria Associated with Human Cancellous Bone
Radiation Response of Bacteria Associated with Human Cancellous BoneRadiation Response of Bacteria Associated with Human Cancellous Bone
Radiation Response of Bacteria Associated with Human Cancellous BoneIOSR Journals
 
Pembuatan Izin Postel
Pembuatan Izin PostelPembuatan Izin Postel
Pembuatan Izin Postellegalservice
 
Machine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebMachine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebEstevam Hruschka
 
Buy cheap mother of the bride dresses australia sydressau.com
Buy cheap mother of the bride dresses australia   sydressau.comBuy cheap mother of the bride dresses australia   sydressau.com
Buy cheap mother of the bride dresses australia sydressau.comGudeer Kitty
 
Cheap flower girl dresses nz,latest flower girl gowns online cmdress.co.nz
Cheap flower girl dresses nz,latest flower girl gowns online   cmdress.co.nzCheap flower girl dresses nz,latest flower girl gowns online   cmdress.co.nz
Cheap flower girl dresses nz,latest flower girl gowns online cmdress.co.nzGudeer Kitty
 
Lace bridesmaid dresses gudeer.com
Lace bridesmaid dresses   gudeer.comLace bridesmaid dresses   gudeer.com
Lace bridesmaid dresses gudeer.comGudeer Kitty
 

Viewers also liked (18)

zzzzzzzz
zzzzzzzzzzzzzzzz
zzzzzzzz
 
Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)Security using colors and armstrong numbers by sravanthi (lollypop)
Security using colors and armstrong numbers by sravanthi (lollypop)
 
F010522834
F010522834F010522834
F010522834
 
G010434851
G010434851G010434851
G010434851
 
ホッケ資源急減の要因と資源管理について
ホッケ資源急減の要因と資源管理についてホッケ資源急減の要因と資源管理について
ホッケ資源急減の要因と資源管理について
 
Satin bridesmaid dresses gudeer.com
Satin bridesmaid dresses   gudeer.comSatin bridesmaid dresses   gudeer.com
Satin bridesmaid dresses gudeer.com
 
Urus Izin Prinsip Perubahan – PMA / PMDN
Urus Izin Prinsip Perubahan – PMA / PMDNUrus Izin Prinsip Perubahan – PMA / PMDN
Urus Izin Prinsip Perubahan – PMA / PMDN
 
D1804011824
D1804011824D1804011824
D1804011824
 
Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)
Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)
Service Pembuatan Izin Nomor Pengenal Importir Khusus (NPIK)
 
A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...
A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...
A Correlative Study of Cardiovascular Response to Sustained Hand Grip in Heal...
 
An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...
An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...
An Empirical Study of Seasonal Rainfall Effect in Calabar, Cross River State,...
 
Radiation Response of Bacteria Associated with Human Cancellous Bone
Radiation Response of Bacteria Associated with Human Cancellous BoneRadiation Response of Bacteria Associated with Human Cancellous Bone
Radiation Response of Bacteria Associated with Human Cancellous Bone
 
Pembuatan Izin Postel
Pembuatan Izin PostelPembuatan Izin Postel
Pembuatan Izin Postel
 
Machine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the WebMachine Learning, Machine Reading and the Web
Machine Learning, Machine Reading and the Web
 
Buy cheap mother of the bride dresses australia sydressau.com
Buy cheap mother of the bride dresses australia   sydressau.comBuy cheap mother of the bride dresses australia   sydressau.com
Buy cheap mother of the bride dresses australia sydressau.com
 
Cheap flower girl dresses nz,latest flower girl gowns online cmdress.co.nz
Cheap flower girl dresses nz,latest flower girl gowns online   cmdress.co.nzCheap flower girl dresses nz,latest flower girl gowns online   cmdress.co.nz
Cheap flower girl dresses nz,latest flower girl gowns online cmdress.co.nz
 
Jeshua
JeshuaJeshua
Jeshua
 
Lace bridesmaid dresses gudeer.com
Lace bridesmaid dresses   gudeer.comLace bridesmaid dresses   gudeer.com
Lace bridesmaid dresses gudeer.com
 

Similar to D018141922

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...TELKOMNIKA JOURNAL
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...IOSR Journals
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015Ashish Gupta
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET Journal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyZac Darcy
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”IOSR Journals
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionBRNSSPublicationHubI
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 

Similar to D018141922 (20)

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
Secure E-voting System by Utilizing Homomorphic Properties of the Encryption ...
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Ijcnc050208
Ijcnc050208Ijcnc050208
Ijcnc050208
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
A Secure Encryption Technique based on Advanced Hill Cipher For a Public Key ...
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015ijrrest_vol-2_issue-2_015
ijrrest_vol-2_issue-2_015
 
F010243136
F010243136F010243136
F010243136
 
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and SteganographyIRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
IRJET- Enhanced Cloud Data Security using Combined Encryption and Steganography
 
C0281010016
C0281010016C0281010016
C0281010016
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
 
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
“Proposed Model for Network Security Issues Using Elliptical Curve Cryptography”
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
Data Communication Using Cryptography Encryption
Data Communication Using Cryptography EncryptionData Communication Using Cryptography Encryption
Data Communication Using Cryptography Encryption
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

D018141922

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 1, Ver. IV(Jan – Feb. 2016), PP 19-22 www.iosrjournals.org DOI: 10.9790/0661-18141922 www.iosrjournals.org 19 | Page An Efficient And Secure Cryptography Techniques Usingunimodular Matrix ApurvaK.Vangujar1 , Kajal Agrawal2 1 Student of BE CSE: Dept of Computer Science & Engineering, Jawaharlal Nehru Engineering College Aurangabad, Maharashtra 431003, and India 2 Student of ME CSE: Dept of Computer Science & Engineering, Jawaharlal Nehru Engineering College, Aurangabad, Maharashtra 431003, and India Abstract: In day to day life, transmission of data from sender to receiver with security is very difficult. "Cryptography" is one of the famous techniques which provide security for confidential data. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and non- repudiation are the main goals of cryptography. The existing system is having limitations related to decrypts of Armstrong numbers. But the algorithm used in the proposed method uses unimodular matrix for encryption. Therefore, access control, non-repudiation and confidentiality of data is maintained. Keywords: cryptography, decryption, encryption, unimodular matrix, Armstrong numbers I. Introduction Security is more important to ensure the confidentiality of data. Sending a data from one node to another node with security is most difficult. There are several techniques are followed for secure data transmission. Cryptography is one of the best techniques for the secure data transmission. Confidentiality of data, access control and non-repudiation are the main goals of cryptography.Cryptography consists of two processes that is encryption and decryption. Encryption and decryptionconsists of the key, i.e. some secret information. Encryption is the process in which plain text, convertsinto cipher text. And cipher text converts into plain text is knows as decryption process. The same key and different key are used for encryption and decryption .The same key might be used for both encryption and decryption depending on the encryption mechanism. While for other mechanisms, the keys used for encryption and decryption might be different.[1], [2], [3] There are many encryption algorithm processes like AES, DES, RSA in which encryption is done with help of substitutions and transformation on plain text. It uses Armstrong numbers. 1. Cryptography using secret key (SKC):secrete key is a value independent of a plain text and of the algorithm. Single key is used for encryption and decryption by an algorithm. It includes of advance encryption standard (AES) and data encryption standard (DES)[4]. 2. Cryptography using public key (PKC): two different keys are used in this cryptography. One key is used for encryption and another is used for decryption[4]. 3. Hash function:It uses mathematical transformation for encryption which is not recoverable from the cipher text[4]. II. Literature Survey The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/ data, and telecommunications) [3] This definition introduces three key objectives that are at the heart of computer security:  Confidentiality: This term covers two related concepts:  Data confidentiality: Assures that private or confidential information is not made available or disclosed to unauthorized individuals.  Privacy: Assures that individuals control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.  Integrity: This term covers two related concepts:  Data integrity: Assures that information and programs are changed only in a specified and authorized manner.  System integrity: Assures that a system performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.
  • 2. An Efficient And Secure Cryptography Techniques Usingunimodular Matrix DOI: 10.9790/0661-18141922 www.iosrjournals.org 20 | Page Availability: Assures that systems work promprolyandservice is not denied to authorize users. Proposed System Fig. 1 proposed system architecture There many techniques used for the secure communication. In our system, Armstrong numbers are used for the secure communication. Proposed method uses unimodular matrix for the encryption.As shown in the above diagram our proposed system will work. Here we are using cryptographic algorithm for encryption and decryption using Armstrong numbers[1]. These are carried out by performing substitutions and transformation of matrix. This technique uses Armstrong no. as same key for both encryption and decryption purposes. Therefore, it is symmetric key cryptography[5], [6]. Encryption algorithm It is the cryptographic technique to convert plain text into cipher text by performing substitution and transformation on message character. This is performed by sender site by using some secret key. Step 1:convert characters of secrete message into their ASCII equivalent. Consider message to be send is ENCRYPT E N C R Y P T - - 69 78 67 82 89 80 84 -25 -25 Step 2: convert data into matrix form 69 78 67 82 89 80 P = 84 -25 -25 Step 3: Select any Armstrong number and calculate encoding matrix by using a unimodular matrix technique as follow: 8n2 +8n 2n+1 4n 4n2 +4n n+1 2n+1 4n2 +4n+1 n 2n-1 Where n = sum of Armstrong number Consider if Armstrong number = 370 n = 3 + 7 + 0 = 10
  • 3. An Efficient And Secure Cryptography Techniques Usingunimodular Matrix DOI: 10.9790/0661-18141922 www.iosrjournals.org 21 | Page Encoding matrix will be 880 21 40 440 11 21 E= 441 10 19 Step 4: Multiply encoding matrix E with data matrix P and resultant matrix will be P that is encrypted matrix 880 21 40 69 78 67 C= 440 1121 * 82 89 80 441 10 19 84 -25 -25 65802 69509 59640 C = 33026 34774 29835 32845 34813 29872 Step 5: convert the resultant values in the form of string 65802, 69509, 59640, 33026, 34774, 29835, 32845, 34813, 29872 This is the cipher text generated which will be send to receiver and he/she will be able to read original message only after decryption. 1. Decryption Algorithm : Decryption is the cryptographic bezique used to convert cipher text into plain text. It is performed by using secrete key which may be same as used in the encryption process or it may be different. In our system we are using same key for encryption and decryption purpose[7]. Step 1: convert the received cipher text into matrix form 65802 69509 59640 C = 33026 34774 29835 32845 34813 29872 Step 2: calculate the inverse of encoding matrix E for decryption matrix D using mathematical formula. -1 1 1 D = 901 -920 -88 -451 461 440 65802 69509 59640 -1 1 1 D*C = 33026 34774 29835 * 901 -920 -880 32845 34813 29872 -451 461 440 69 78 67 D*C= 82 89 80 84 -25 -25 Step 3: Now resultant matrix containing the ASCII values for the alphabets in message. So, convert matrix into string. 69, 78, 67, 82, 89, 80, 84, -25, -25 Step 5: convert ASCII values into equivalent.
  • 4. An Efficient And Secure Cryptography Techniques Usingunimodular Matrix DOI: 10.9790/0661-18141922 www.iosrjournals.org 22 | Page 69 78 67 82 89 80 84 -25 -25 E N C R Y P T - - This is original message send by sender and now decryption is done successfully.Reciever is able to read message[2], [8]. Previously we were using concepts Armstrong numbers with some algorithm .But this technique was having limitations. Because values are private keys of user it should not be known to other users. Another limitation was about Armstrong no. The technique which was used was not useful for decryption. This is because if Armstrong no contains 0 then inverse of encoding matrix is not possible which is required for decryption.Now we have overcome this limitation by using concept of unimodular matrix. Message length restrictions have also overcome using unimodular matrix[6]. III. Anyalsis And Result The above technique involves keys with a minimum key length which reduces the efforts taken to encrypt the data. The key length can be increased if needed, with increase in character length. This increases the complexity thereby providing increased security[2]. A unimodular matrix is matrix with real square with its determinant det (A) = {-1, 0, 1}[6] This technique ensures that the data transfer can be performed with protection since it involves two main steps. First step is to convert the characters into another form that means in ASCII values, Second step by adding with the digits of the Encoding matrix to form the required encrypted data using unimodular matrix. Tracing process becomes difficult with this technique[8]. This is because data is encrypted by key usingArmstrong number and again this Armstrong number is encrypted by using as key. So it is more secure.In this proposed technique encryption algorithm is too difficult to trace or hack externally[9]. IV. Conclusion The above combination of secret key and public key cryptography can be applied mainly in military where data security is given more importance. This technique provides more security with increase in key length of the Armstrong numbers[3]. Thus usage of three set of keys namely colors, additional set of key values and Armstrong numbers in this technique ensures that the data is transmitted securely and accessed only by authorized people[10], [2]. References [1]. Ajmal, K., et al. Security using Colors, Figures and Images. in International Conference on Emerging Technology Trends on Advanced Engineering Research (ICETT’12) Proceedings published by International Journal of Computer Applications (IJCA). 2012. [2]. Belose, S., M. Malekar, and G. Dharmawat, Data Security Using Armstrong Numbers. International Journal of Emerging Technology and Advanced Engineering. ISSN, 2012: p. 2250-2459. [3]. Stallings, W., Cryptography and Network Security, 4/E. 2006: Pearson Education India. [4]. Anoop, M., Public key Cryptography-applications Algorithms and Mathematical Explanations. Tata Elxsi Ltd, India, 2007. [5]. Rescorla, E., Diffie-Hellman key agreement method. 1999. [6]. Weisstein, E.W., Unimodular matrix. 2003. [7]. Cormen, T.H., et al., Introduction to algorithms. Vol. 6. 2001: MIT press Cambridge. [8]. Deepa, S.P., S. Kannimuthu, and V. Keerthika. Security using colors and Armstrong numbers. in Innovations in Emerging Technology (NCOIET), 2011 National Conference on. 2011. IEEE. [9]. Bansode, A., et al., Data Security in Message Passing using Armstrong Number. [10]. Saoji, S., et al., Securing e-mails in XML format using colors and Armstrong numbers. International Journal of Scientific & Engineering Research, ISSN, 2013: p. 2229-5518.