Empowering Secure Communication With Specific Triangular Matrices: Practical Examples Unveiled Using Different Approximations

Empowering Secure Communication With Specific Triangular Matrices: Practical Examples Unveiled Using Different Approximations

Özen Özer Özer, Nadir Subasi
Copyright: © 2024 |Pages: 22
DOI: 10.4018/979-8-3693-5330-1.ch011
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

In the fast-evolving realm of digital interaction and information sharing, cryptographic security serves as a fundamental pillar, safeguarding sensitive data and ensuring privacy. Cryptographic protocols, the fundamental elements of secure communication, rely on mathematical principles and computational strategies to foil attempts at breaching confidentiality and integrity. Within this domain, the upper triangular matrix has emerged as a significant mathematical concept. In this paper, an upper triangular matrix is used with Hill Chipher, logic map, and encryption/ decryption algorithms written in python programming language for cryptography. The mapping is done in a dictionary consisting of only writable characters of ASCII values and Turkish characters. Thus, both the Turkish character sensitivity and the character limit are extended with the string data type. Additionally, to these cryptographic methods, another different crypto approximation named as Hash function is considered; phyton codes prepared for the example, too.
Chapter Preview

Complete Chapter List

Search this Book:
Reset