Novel Advent For Add-On Security By Magic Square Intrication

α
S. Praveen Kumar
S. Praveen Kumar
σ
K. Naveen Kumar
K. Naveen Kumar
ρ
S. Sreenadh
S. Sreenadh
Ѡ
B. Aravind
B. Aravind
¥
Komaraju Hemanth kumar
Komaraju Hemanth kumar
α GITAM University GITAM University

Send Message

To: Author

Novel Advent For Add-On Security By Magic Square Intrication

Article Fingerprint

ReserarchID

2A8P7

Novel Advent For Add-On Security By Magic Square Intrication Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu

Abstract

The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces diverse cipher text from a clear text. The RSA, the extensively used public key algorithm and other public key algorithms may not guarantee that the cipher text is copiously secured. As an alternative approach to handling ASCII characters in the cryptosystems, a magic square implementation is deliberated of in this work. It attempts to augment the efficiency by providing add-on security to the cryptosystem. This approach will boost the security due to its complexity in encryption because it deals with the magic square. Here, encryption / decryption is based on numerals generated by magic square rather than ASCII values. In this, we add the ASCII value and the numeral in the consequent magic square. Because to encrypt the plaintext characters, their ASCII values are taken and if a character occurs in numerous places in a plaintext there is a possibility of same cipher text is produced. To surmount the problem, this paper attempts to develop a technique in which a constant is added for the recurring character.

References

15 Cites in Article
  1. Gopinanadh Ganapathi,K Mani (2009). Add on security model for public key Cryptosystem based on magic square implementation.
  2. R Rivest (1996). Hand book of Applied Cryptography.
  3. Herbert Schildt The Complete Reference.
  4. Patrick Naughton,Michael Morrison The Java Handbook.
  5. W Benson,O Jacoby New Recreations with Magic Squares.
  6. N Gauthier (1997). Singular matrices applied to 3 × 3 magic squares.
  7. A Thompson (1994). Odd Magic Powers.
  8. K Ollerenshaw,H Bondi Magic Squares of Order 4.
  9. H Dudeney (1927). The Canterbury Puzzles (and other curious problems).
  10. M Gardner Mathematical games: a breakthrough in magic squares and the first perfect magic cube.
  11. T Fletcher (1972). Linear Algebra through its Applications.
  12. James Ward,Iii Vector spaces of Magic Squares.
  13. Arno Van Den Essen (1990). Magic Squares and Linear Algebra.
  14. C Heinrich Magic Squares and Linear Algebra.
  15. C Leinbach,D Pountney Appropriate use of Computer Algebra Systems in Teaching Mathematics.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

S. Praveen Kumar. 1970. \u201cNovel Advent For Add-On Security By Magic Square Intrication\u201d. Unknown Journal GJCST Volume 11 (GJCST Volume 11 Issue 21): .

Download Citation

Journal Specifications
Version of record

v1.2

Issue date

December 27, 2011

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 20606
Total Downloads: 10900
2026 Trends
Related Research

Published Article

The efficiency of a cryptographic algorithm is based on its time taken for encryption / decryption and the way it produces diverse cipher text from a clear text. The RSA, the extensively used public key algorithm and other public key algorithms may not guarantee that the cipher text is copiously secured. As an alternative approach to handling ASCII characters in the cryptosystems, a magic square implementation is deliberated of in this work. It attempts to augment the efficiency by providing add-on security to the cryptosystem. This approach will boost the security due to its complexity in encryption because it deals with the magic square. Here, encryption / decryption is based on numerals generated by magic square rather than ASCII values. In this, we add the ASCII value and the numeral in the consequent magic square. Because to encrypt the plaintext characters, their ASCII values are taken and if a character occurs in numerous places in a plaintext there is a possibility of same cipher text is produced. To surmount the problem, this paper attempts to develop a technique in which a constant is added for the recurring character.

Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Novel Advent For Add-On Security By Magic Square Intrication

S. Praveen Kumar
S. Praveen Kumar GITAM University
K. Naveen Kumar
K. Naveen Kumar
S. Sreenadh
S. Sreenadh
B. Aravind
B. Aravind
Komaraju Hemanth kumar
Komaraju Hemanth kumar

Research Journals