Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/4508
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | Computer Engineering | en_US |
dc.date.accessioned | 2012-09-03T08:53:30Z | - |
dc.date.available | 2012-09-03T08:53:30Z | - |
dc.date.issued | 2012-09-03 | - |
dc.identifier.uri | http://hdl.handle.net/10603/4508 | - |
dc.description.abstract | In this thesis, we have investigated several problems in the area of cryptography. In these problems, we have developed several block ciphers, wherein, iteration plays a fundamental role. The first chapter is introductory in nature. It deals with the basic concepts and a survey of the relevant literature in the area of cryptography. In the second chapter, we have developed a block cipher by taking a large key matrix (of size 384 binary bits) and a plaintext matrix containing two columns (112 bits). In this, the plaintext column vectors, operated by the key matrix are thoroughly interlaced at each stage of the iteration. The cryptanalysis carried out in this chapter clearly indicates that the cipher is difficult to break by any conventional cryptanalytic attack. In chapter 3, we have developed a large block cipher by modifying the Hill cipher. This is an extension of the analysis carried out in chapter 2, to a plaintext block of unlimited size. Chapter 4 is devoted to the study of a block cipher basing upon the modification of the Hill cipher. In this, we have considered the effect of key dependent permutation together with interlacing. The analysis clearly reveals the strength of the cipher. In chapter 5, we have dealt with another block cipher, wherein the size of the key matrix is 384 bits and the size of the plaintext is as large as we please. Here also, we have studied the effects of the key dependent permutation, interlacing and the iteration. Here, we have noticed that all these agents are strengthening the cipher in a remarkable manner. Chapter 6 deals with another modification of the Hill cipher. In this, we have introduced interweaving in each step of the iteration. Here, we have found that the interweaving of the resulting plaintext, at each stage of the iteration, and the multiplication with the key matrix strengthen the cipher quite significantly. In the investigation presented in chapter 7, we have extended the analysis of the modified Hill cipher involving interweaving. | en_US |
dc.format.extent | 235p. | en_US |
dc.language | English | en_US |
dc.relation | 145 | en_US |
dc.rights | university | en_US |
dc.title | A study of some block ciphers for secure transmission of information | en_US |
dc.title.alternative | - | en_US |
dc.creator.researcher | Ravi Shankar, N | en_US |
dc.subject.keyword | Cryptography | en_US |
dc.subject.keyword | Modular Arithmetic Inverse | en_US |
dc.subject.keyword | Hill Cipher | en_US |
dc.description.note | References p.223-235 | en_US |
dc.contributor.guide | Durga Bhavani, S | en_US |
dc.contributor.guide | Sastry, V U K | en_US |
dc.publisher.place | Kukatpally | en_US |
dc.publisher.university | Jawaharlal Nehru Technological University | en_US |
dc.publisher.institution | Faculty of Computer Science and Engineering | en_US |
dc.date.registered | n.d. | en_US |
dc.date.completed | September, 2011 | en_US |
dc.date.awarded | 2011 | en_US |
dc.format.dimensions | - | en_US |
dc.format.accompanyingmaterial | None | en_US |
dc.type.degree | Ph.D. | en_US |
dc.source.inflibnet | INFLIBNET | en_US |
Appears in Departments: | Faculty of Computer Science & Engineering |
Files in This Item:
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: