mailto:uumlib@uum.edu.my 24x7 Service; AnyTime; AnyWhere

Cryptographic Algorithm Using Matrix Inversion as Data Protection

Zirra, Peter B. and Wajiga, G.M. (2011) Cryptographic Algorithm Using Matrix Inversion as Data Protection. Journal of Information and Communication Technology, 10. pp. 67-83. ISSN 2180-3862

[thumbnail of JICT 10 00 2011 67-83.pdf]
Preview
PDF - Published Version
Available under License Attribution 4.0 International (CC BY 4.0).

Download (594kB) | Preview

Abstract

This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear equations in conjunction with the principles of the delta encoding scheme, a formula and a lookup alphanumeric position table. The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. The proposed algorithms ensured that unauthorized users do not have access to sensitive and classified documents stored or transmitted to an intended recipient without a secret key. This means that, there is confidentiality, non-repudiation and integrity of our sensitive and classified information from the hands of unauthorized users on the Internet because of the robustness of the proposed algorithms.

Item Type: Article
Uncontrolled Keywords: Cryptographic algorithms, Delta encoding, Newtons method, Inversion matrix, Non-linear equations, Decryption key, Cryptanalyst
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Divisions: School of Computing
Depositing User: Mrs Nurin Jazlina Hamid
Date Deposited: 20 Feb 2024 14:09
Last Modified: 20 Feb 2024 14:09
URI: https://repo.uum.edu.my/id/eprint/30438

Actions (login required)

View Item View Item