Cryptographic Algorithm Using Matrix Inversion as Data Protection
This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear eq...
Main Authors: | Zirra, Peter B., Wajiga, G.M. |
---|---|
Format: | Article |
Language: | English |
Published: |
Universiti Utara Malaysia Press
2011
|
Subjects: | |
Online Access: | https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf |
Similar Items
-
Cryptanalysis in cryptographic algorithm design
by: Z'aba, Muhammad Reza, et al.
Published: (2006) -
Broad view of cryptographic hash functions
by: Alahmad, Mohammad, et al.
Published: (2013) -
Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications
by: Jahani, Shahram, et al.
Published: (2014) -
A cryptographic-biometric mechanism for enhancing SET authentication
by: Awadelkarim, Awad M., et al.
Published: (2005) -
MOIM: a novel design of cryptographic hash function
by: Alahmad, Mohammad, et al.
Published: (2013)