Cryptographic Algorithm Using Matrix Inversion as Data Protection
This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear eq...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Utara Malaysia Press
2011
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf https://repo.uum.edu.my/id/eprint/30438/ https://e-journal.uum.edu.my/index.php/jict/article/view/8109 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Utara Malaysia |
Language: | English |
id |
my.uum.repo.30438 |
---|---|
record_format |
eprints |
spelling |
my.uum.repo.304382024-02-20T14:09:50Z https://repo.uum.edu.my/id/eprint/30438/ Cryptographic Algorithm Using Matrix Inversion as Data Protection Zirra, Peter B. Wajiga, G.M. QA75 Electronic computers. Computer science This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear equations in conjunction with the principles of the delta encoding scheme, a formula and a lookup alphanumeric position table. The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. The proposed algorithms ensured that unauthorized users do not have access to sensitive and classified documents stored or transmitted to an intended recipient without a secret key. This means that, there is confidentiality, non-repudiation and integrity of our sensitive and classified information from the hands of unauthorized users on the Internet because of the robustness of the proposed algorithms. Universiti Utara Malaysia Press 2011 Article PeerReviewed application/pdf en cc4_by https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf Zirra, Peter B. and Wajiga, G.M. (2011) Cryptographic Algorithm Using Matrix Inversion as Data Protection. Journal of Information and Communication Technology, 10. pp. 67-83. ISSN 2180-3862 https://e-journal.uum.edu.my/index.php/jict/article/view/8109 10.32890/jict 10.32890/jict 10.32890/jict |
institution |
Universiti Utara Malaysia |
building |
UUM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Utara Malaysia |
content_source |
UUM Institutional Repository |
url_provider |
http://repo.uum.edu.my/ |
language |
English |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Zirra, Peter B. Wajiga, G.M. Cryptographic Algorithm Using Matrix Inversion as Data Protection |
description |
This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear equations in conjunction with the principles of the delta encoding scheme, a formula and a lookup alphanumeric position table. The algorithms were tested with samples of real data and the result practically demonstrated how systems of non-linear equations turned into linear equations are indeed of relevance in providing strong and complex encryption and decryption keys to protect sensitive information in store or in transit via unsecure channels. The proposed algorithms ensured that unauthorized users do not have access to sensitive and classified documents stored or transmitted to an intended recipient without a secret key. This means that, there is confidentiality, non-repudiation and integrity of our sensitive and classified information from the hands of unauthorized users on the Internet because of the robustness of the proposed algorithms. |
format |
Article |
author |
Zirra, Peter B. Wajiga, G.M. |
author_facet |
Zirra, Peter B. Wajiga, G.M. |
author_sort |
Zirra, Peter B. |
title |
Cryptographic Algorithm Using Matrix Inversion as Data Protection |
title_short |
Cryptographic Algorithm Using Matrix Inversion as Data Protection |
title_full |
Cryptographic Algorithm Using Matrix Inversion as Data Protection |
title_fullStr |
Cryptographic Algorithm Using Matrix Inversion as Data Protection |
title_full_unstemmed |
Cryptographic Algorithm Using Matrix Inversion as Data Protection |
title_sort |
cryptographic algorithm using matrix inversion as data protection |
publisher |
Universiti Utara Malaysia Press |
publishDate |
2011 |
url |
https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf https://repo.uum.edu.my/id/eprint/30438/ https://e-journal.uum.edu.my/index.php/jict/article/view/8109 |
_version_ |
1792158595689742336 |