DeepAI AI Chat
Log In Sign Up

Encryption based on Conference Matrix

by   Shipra Kumari, et al.
Central University of Jharkhand

In this article, an encryption scheme based on (-1, 1) conference matrix has been developed. The decryption key comprising of fixed number of positive integers with prime power yields the high level security of message. Some popular attacks has been discussed in the context of cryptoanalysis and observed that it is robust against the popular cipher attack and the security of the information does not compromise.


page 1

page 2

page 3

page 4


On the security of a Loidreau's rank metric code based encryption scheme

We present a polynomial time attack of a rank metric code based encrypti...

Attack Detection for Networked Control Systems Using Event-Triggered Dynamic Watermarking

Dynamic watermarking schemes can enhance the cyber attack detection capa...

Cryptographic analysis of the Modified Matrix Modular Cryptosystem

We show that the Modified Matrix Modular Cryptosystem proposed by S.K. R...

A New Cryptographic Approach: Iterated Random Encryption (IRE)

A new cryptographic approach -- Iterated Random Encryption (IRE) -- is p...

A Dive into WhatsApp's End-to-End Encryption

We live in a generation where the world around us is witnessing technolo...

Computing Power, Key Length and Cryptanalysis. An Unending Battle?

There are several methods to measure computing power. On the other hand,...

MemShield: GPU-assisted software memory encryption

Cryptographic algorithm implementations are vulnerable to Cold Boot atta...