Randomized approach for block cipher encryption

Srinivasan Nagaraj, D. S.V.P. Raju, Kishore Bhamidipati

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)


In cryptography, a substitution block cipher is a method of encryption by which units of plain text are replaced with cipher text according to a regular system. The receiver deciphers the text by performing an inverse substitution. If the cipher operates on single blocks, it is termed as simple substitution block cipher. The proposed method that considers a random matrix which is chosen from the length of the given input text. Here the input text is stored in the matrices which are selected with minimum cost. There on the series of operations are performed and cipher text is produced, in decryption inverse matrix is calculated and the operations are performed in order to generate the plain text. As we are using random matrix and then the inverse matrix calculation is performed which adds more security for cracking the key. Thus, the cipher text obtained is very difficult to be broken without knowing the key, which provides high security.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Frontiers of Intelligent Computing
Subtitle of host publicationTheory and Applications, FICTA 2012
PublisherSpringer Verlag
Number of pages8
ISBN (Print)9783642353130
Publication statusPublished - 01-01-2013
Event1st International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2012 - Bhubaneswar, Odisa, India
Duration: 22-12-201223-12-2012

Publication series

NameAdvances in Intelligent Systems and Computing
Volume199 AISC
ISSN (Print)2194-5357


Conference1st International Conference on Frontiers in Intelligent Computing: Theory and Applications, FICTA 2012
CityBhubaneswar, Odisa

All Science Journal Classification (ASJC) codes

  • Control and Systems Engineering
  • Computer Science(all)


Dive into the research topics of 'Randomized approach for block cipher encryption'. Together they form a unique fingerprint.

Cite this