Abstract
The probabilistic encryption produces more than one ciphertext for the same plaintext. In this paper an attempt has been made to propose a probabilistic encryption algorithm based on simple linear transformation. The variable length sub key groups are generated using a random sequence. A randomly selected element is replaced by each element of the plaintext from the corresponding indexed sub key group. With this a cryptanalyst cannot encrypt a random plaintext looking for correct ciphertext. The security analysis and performance of the method are studied and presented.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Ahmed, Y.M., Chefranov, A.G.: Hill cipher modification based on eigenvalues hcm-EE. In: Proceedings of the 2th International Conference on Security of Information and Networks, October 6-10, pp. 164–167. ACM Press, New York (2009), doi:10.1145/1626195.1626237
Ahmed, Y.M., Chefranov, A.: Hill cipher modification based on pseudo-random eigen values HCM-PRE. Applied Mathematics and Information Sciences (SCI-E) 8(2), 505–516 (2011)
Ahmed, Y.M., Chefranov, A.: Hill cipher modification based generalized permutation matrix SHC-GPM. Information Science Letter 1, 91–102
Hill, L.S.: Cryptography in an Algebraic Alphabet. Am. Math. Monthly 36, 306–312 (1929), http://www.jstor.org/discover/10.2307/2298294?uid=3738832&uid=2129&uid=2&uid=70&uid=4&sid=21102878411191
Ismail, I.A., Amin, M., Diab, H.: How to repair the hill cipher. J. Zhej. Univ. Sci. A. 7, 2022–2030 (2006), doi:10.1631/jzus.2006.A2022
Kaipa, A.N.R., Bulusu, V.V., Koduru, R.R., Kavati, D.P.: A Hybrid Cryptosystem using Variable Length Sub Key Groups and Byte Substitution. J. Comput. Sci. 10, 251–254 (2014)
Keliher, L., Delaney, A.Z.: Cryptanalysis of the toorani-falahati hill ciphers. Mount Allison University (2013), http://eprint.iacr.org/2013/592.pdf
Lin, C.H., Lee, C.Y., Lee, C.Y.: Comments on Saeednia’s improved scheme for the hill cipher. J. Chin. Instit. Eng. 27, 743–746 (2004), doi:10.1080/02533839.2004.9670922
Overbey, J., Traves, W., Wojdylo, J.: On the keyspace of the hill cipher. Cryptologia 29, 59–72 (2005), doi:10.1080/0161-110591893771
Rangel-Romeror, Y., Vega-Garcia, R., Menchaca-Mendez, A., Acoltzi-Cervantes, D., Martinez-Ramos, L., et al.: Comments on “How to repair the Hill cipher”. J. Zhej. Univ. Sci. A 9, 211–214 (2008), doi:10.1631/jzus.A072143
Reddy, K.A., Vishnuvardhan, B., Madhuviswanath, Krishna, A.V.N.: A modified hill cipher based on circulant matrices. In: Proceedings of the 2nd International Conference on Computer, Communication, Control and Information Technology, February 25-26, pp. 114–118. Elsevier Ltd. (2012), doi:10.1016/j.protcy.2012.05.016
Reddy, K.A., Vishnuvardhan, B., Durgaprasad: Generalized Affine Transformation Based on Circulant Matrices. Internatonal Journal of Distributed and Parallel Systems 3(5), 159–166 (2012)
Saeednia, S.: How to make the hill cipher secure. Cryptologia 24, 353–360 (2000), doi:10.1080/01611190008984253
Toorani, M., Falahati, A.: A secure variant of the hill cipher. In: Proceedings of the IEEE Symposium on Computers and Communications, July 5-8, pp. 313–316. IEEE Xplore Press, Sousse (2009), doi:10.1109/ISCC.2009.5202241
Toorani, M., Falahati, A.: A secure cryptosystem based on affine transformation. Sec. Commun. Netw. 4, 207–215 (2011), doi:10.1002/sec.137
Yeh, Y.S., Wu, T.C., Chang, C.C.: A new cryptosystem using matrix transformation. In: Proceedings of the 25th IEEE International Carnahan Conference on Security Technology, October 1-3, pp. 131–138. IEEE Xplore Press, Taipei (1991), doi:10.1109/CCST.1991.202204
Reddy, K.A., Vishnuvardhan, B.: Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution. International Journal of Security 8(3), 24–32
Gold Wasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28(2), 270–299, doi:10.1016/0022-0000(84)90070-9
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Reddy, K.A.N., Vishnuvardhan, B. (2015). The Probabilistic Encryption Algorithm Using Linear Transformation. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-13731-5_42
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-13730-8
Online ISBN: 978-3-319-13731-5
eBook Packages: EngineeringEngineering (R0)