Abstract

In this article, we have explained the RSA public-key cryptosystem initiate by Rivest and Hill Chiper cryptosystem initiate by Lester. Hill for coding and decoding the text. To explain these we apply the Euler-phi function, congruence, and simple Matrix Application in cryptography to decode and encode the message. In our analyses, we have collaborated two cryptosystems which is more assured than standard cryptographic process such as Ceaser cipher. We apply both secret-key cryptography and public-key cryptography which differ from standard cryptography. In our presentation, we use two keys for coding and two for decoding.

Highlights

  • Institutions in both the public and private sectors have become progressively based on electronic data processing

  • The safety of our collaborate Hill cipher and RSA cryptography system is ground on various factors: First is that we utilize a key matrix A, which is only recognized to first party and second party (Koblitz, 1998)

  • Third since you recognize n it will be relatively simple to find j if you just divide n to determine the primes p and never less no one has enough time effectively to factor n when n only two very large prime factors and fourth the collaborate of these two cryptosystem gives a safety where the plaintext is entirely unthinkable to find out for the third parties

Read more

Summary

Conference Paper

An Execution of a Mathematical Example Using Euler’s Phi-Function in Hill Chiper Cryptosystem. § Presented at the International conference on Applied Science Mathematics and Statistics (ICASMS - 2020), 25-26 November 2020, organized by SciencePlus Global Research Forum

INTRODUCTION
LINEAR CONGRUENCE
RSA CRYPTOSYSTEM
HILL CIPHER CRYPTOSYSTEM
Now the encoding matrix E is
Now similarly we have
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.