Cryptographic Algorithm Using Matrix Inversion as Data Protection

This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear eq...

Full description

Saved in:
Bibliographic Details
Main Authors: Zirra, Peter B., Wajiga, G.M.
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2011
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf
https://repo.uum.edu.my/id/eprint/30438/
https://e-journal.uum.edu.my/index.php/jict/article/view/8109
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Utara Malaysia
Language: English
id my.uum.repo.30438
record_format eprints
spelling my.uum.repo.304382024-02-20T14:09:50Z https://repo.uum.edu.my/id/eprint/30438/ Cryptographic Algorithm Using Matrix Inversion as Data Protection Zirra, Peter B. Wajiga, G.M. QA75 Electronic computers. Computer science This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear equations in conjunction with the principles of the delta encoding scheme, a formula and a lookup alphanumeric position table. The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. The proposed algorithms ensured that unauthorized users do not have access to sensitive and classified documents stored or transmitted to an intended recipient without a secret key. This means that, there is confidentiality, non-repudiation and integrity of our sensitive and classified information from the hands of unauthorized users on the Internet because of the robustness of the proposed algorithms. Universiti Utara Malaysia Press 2011 Article PeerReviewed application/pdf en cc4_by https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf Zirra, Peter B. and Wajiga, G.M. (2011) Cryptographic Algorithm Using Matrix Inversion as Data Protection. Journal of Information and Communication Technology, 10. pp. 67-83. ISSN 2180-3862 https://e-journal.uum.edu.my/index.php/jict/article/view/8109 10.32890/jict 10.32890/jict 10.32890/jict
institution Universiti Utara Malaysia
building UUM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Utara Malaysia
content_source UUM Institutional Repository
url_provider http://repo.uum.edu.my/
language English
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Zirra, Peter B.
Wajiga, G.M.
Cryptographic Algorithm Using Matrix Inversion as Data Protection
description This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear equations in conjunction with the principles of the delta encoding scheme, a formula and a lookup alphanumeric position table. The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. The proposed algorithms ensured that unauthorized users do not have access to sensitive and classified documents stored or transmitted to an intended recipient without a secret key. This means that, there is confidentiality, non-repudiation and integrity of our sensitive and classified information from the hands of unauthorized users on the Internet because of the robustness of the proposed algorithms.
format Article
author Zirra, Peter B.
Wajiga, G.M.
author_facet Zirra, Peter B.
Wajiga, G.M.
author_sort Zirra, Peter B.
title Cryptographic Algorithm Using Matrix Inversion as Data Protection
title_short Cryptographic Algorithm Using Matrix Inversion as Data Protection
title_full Cryptographic Algorithm Using Matrix Inversion as Data Protection
title_fullStr Cryptographic Algorithm Using Matrix Inversion as Data Protection
title_full_unstemmed Cryptographic Algorithm Using Matrix Inversion as Data Protection
title_sort cryptographic algorithm using matrix inversion as data protection
publisher Universiti Utara Malaysia Press
publishDate 2011
url https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf
https://repo.uum.edu.my/id/eprint/30438/
https://e-journal.uum.edu.my/index.php/jict/article/view/8109
_version_ 1792158595689742336