Skip to main content

The Probabilistic Encryption Algorithm Using Linear Transformation

  • Conference paper
  • 2324 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 338))

Abstract

The probabilistic encryption produces more than one ciphertext for the same plaintext. In this paper an attempt has been made to propose a probabilistic encryption algorithm based on simple linear transformation. The variable length sub key groups are generated using a random sequence. A randomly selected element is replaced by each element of the plaintext from the corresponding indexed sub key group. With this a cryptanalyst cannot encrypt a random plaintext looking for correct ciphertext. The security analysis and performance of the method are studied and presented.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Ahmed, Y.M., Chefranov, A.G.: Hill cipher modification based on eigenvalues hcm-EE. In: Proceedings of the 2th International Conference on Security of Information and Networks, October 6-10, pp. 164–167. ACM Press, New York (2009), doi:10.1145/1626195.1626237

    Google Scholar 

  2. Ahmed, Y.M., Chefranov, A.: Hill cipher modification based on pseudo-random eigen values HCM-PRE. Applied Mathematics and Information Sciences (SCI-E) 8(2), 505–516 (2011)

    Google Scholar 

  3. Ahmed, Y.M., Chefranov, A.: Hill cipher modification based generalized permutation matrix SHC-GPM. Information Science Letter 1, 91–102

    Google Scholar 

  4. Hill, L.S.: Cryptography in an Algebraic Alphabet. Am. Math. Monthly 36, 306–312 (1929), http://www.jstor.org/discover/10.2307/2298294?uid=3738832&uid=2129&uid=2&uid=70&uid=4&sid=21102878411191

    Article  MATH  Google Scholar 

  5. Ismail, I.A., Amin, M., Diab, H.: How to repair the hill cipher. J. Zhej. Univ. Sci. A. 7, 2022–2030 (2006), doi:10.1631/jzus.2006.A2022

    Article  MATH  Google Scholar 

  6. Kaipa, A.N.R., Bulusu, V.V., Koduru, R.R., Kavati, D.P.: A Hybrid Cryptosystem using Variable Length Sub Key Groups and Byte Substitution. J. Comput. Sci. 10, 251–254 (2014)

    Article  Google Scholar 

  7. Keliher, L., Delaney, A.Z.: Cryptanalysis of the toorani-falahati hill ciphers. Mount Allison University (2013), http://eprint.iacr.org/2013/592.pdf

  8. Lin, C.H., Lee, C.Y., Lee, C.Y.: Comments on Saeednia’s improved scheme for the hill cipher. J. Chin. Instit. Eng. 27, 743–746 (2004), doi:10.1080/02533839.2004.9670922

    Article  MathSciNet  Google Scholar 

  9. Overbey, J., Traves, W., Wojdylo, J.: On the keyspace of the hill cipher. Cryptologia 29, 59–72 (2005), doi:10.1080/0161-110591893771

    Article  Google Scholar 

  10. Rangel-Romeror, Y., Vega-Garcia, R., Menchaca-Mendez, A., Acoltzi-Cervantes, D., Martinez-Ramos, L., et al.: Comments on “How to repair the Hill cipher”. J. Zhej. Univ. Sci. A 9, 211–214 (2008), doi:10.1631/jzus.A072143

    Article  Google Scholar 

  11. Reddy, K.A., Vishnuvardhan, B., Madhuviswanath, Krishna, A.V.N.: A modified hill cipher based on circulant matrices. In: Proceedings of the 2nd International Conference on Computer, Communication, Control and Information Technology, February 25-26, pp. 114–118. Elsevier Ltd. (2012), doi:10.1016/j.protcy.2012.05.016

    Google Scholar 

  12. Reddy, K.A., Vishnuvardhan, B., Durgaprasad: Generalized Affine Transformation Based on Circulant Matrices. Internatonal Journal of Distributed and Parallel Systems 3(5), 159–166 (2012)

    Article  Google Scholar 

  13. Saeednia, S.: How to make the hill cipher secure. Cryptologia 24, 353–360 (2000), doi:10.1080/01611190008984253

    Article  Google Scholar 

  14. Toorani, M., Falahati, A.: A secure variant of the hill cipher. In: Proceedings of the IEEE Symposium on Computers and Communications, July 5-8, pp. 313–316. IEEE Xplore Press, Sousse (2009), doi:10.1109/ISCC.2009.5202241

    Google Scholar 

  15. Toorani, M., Falahati, A.: A secure cryptosystem based on affine transformation. Sec. Commun. Netw. 4, 207–215 (2011), doi:10.1002/sec.137

    Article  Google Scholar 

  16. Yeh, Y.S., Wu, T.C., Chang, C.C.: A new cryptosystem using matrix transformation. In: Proceedings of the 25th IEEE International Carnahan Conference on Security Technology, October 1-3, pp. 131–138. IEEE Xplore Press, Taipei (1991), doi:10.1109/CCST.1991.202204

    Google Scholar 

  17. Reddy, K.A., Vishnuvardhan, B.: Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution. International Journal of Security 8(3), 24–32

    Google Scholar 

  18. Gold Wasser, S., Micali, S.: Probabilistic Encryption. Journal of Computer and System Sciences 28(2), 270–299, doi:10.1016/0022-0000(84)90070-9

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Reddy, K.A.N., Vishnuvardhan, B. (2015). The Probabilistic Encryption Algorithm Using Linear Transformation. In: Satapathy, S., Govardhan, A., Raju, K., Mandal, J. (eds) Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2. Advances in Intelligent Systems and Computing, vol 338. Springer, Cham. https://doi.org/10.1007/978-3-319-13731-5_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-13731-5_42

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-13730-8

  • Online ISBN: 978-3-319-13731-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics