• May 27, 2016 News!The submission for Special Issue is officially open now!   [Click]
  • May 03, 2016 News!Vol.6, No.6 has been indexed by EI (Inspec).   [Click]
  • Mar 17, 2017 News!Vol.9, No.2 has been published with online version. 13 peer reviewed articles from 4 specific areas are published in this issue.   [Click]
General Information
Editor-in-chief
Prof. Wael Badawy
Department of Computing and Information Systems Umm Al Qura University, Canada
I'm happy to take on the position of editor in chief of IJCTE. We encourage authors to submit papers concerning any branch of computer theory and engineering.
IJCTE 2010 Vol.2(5): 805-808 ISSN: 1793-8201
DOI: 10.7763/IJCTE.2010.V2.244

A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side

V. U. K. Sastry, D. S. R. Murthy, S. Durga Bhavani
Abstract—In this paper, we have modified the Hill cipher by developing an iterative procedure consisting of three steps. In the first step, the plain text matrix is multiplied with the key matrix on one side and with its inverse on the other side. In the second step, the plain text matrix is mixed thoroughly by using a function called Mix ( ). In the last step, the plain text matrix is modified by using XOR operation between the plain text matrix and the key matrix. The cryptanalysis and the avalanche effect discussed in this paper, conspicuously indicate that the cipher is a strong one and it is quite comparable with the other block ciphers.

Index Terms—Block cipher, Key, Modular arithmetic inverse, Encryption, Decryption.

1Dr. V. U. K. Sastry is with Dept. of Computer Science & Engg., SNIST, Hyderabad, India, (e-mail: vuksastry@rediffmail.com).
2Prof. D. S. R. Murthy is with Dept. of Information Technology, SNIST, Hyderabad, India, (e-mail: dsrmurthy.1406@gmail.com).
3Dr. S. Durga Bhavani is with School of Information Technology, SIT, JNTUH, Hyderabad, India, (e-mail: sdurga.bhavani@gmail.com).

[PDF]

Cite: Dr. V. U. K. Sastry, Prof. D. S. R. Murthy and Dr. S. Durga Bhavani, "A Block Cipher Having a Key on One Side of the Plain Text Matrix and its Inverse on the Other Side," International  Journal  of  Computer Theory and Engineering vol. 2, no. 5, pp. 805-808, 2010.
Copyright © 2008-2015. International Journal of Computer Theory and Engineering. All rights reserved.
E-mail: ijcte@vip.163.com