Research Paper of Cryptography
Research Paper of Cryptography
ABSTRACT
Our approach begins by bridging the gap Through rigorous experimentation and
between visual and textual information evaluation, we demonstrate the
through the utilization of optical effectiveness and versatility of our
character recognition (OCR) to convert approach across a spectrum of quoted
quoted images into machine-readable images and QR codes. Evaluation metrics
text. Simultaneously, we extract relevant encompass encryption strength,
data from QR codes, providing a computational efficiency, and user
seamless integration of image-based data satisfaction, providing comprehensive
into the encryption workflow. This initial insights into the practical applicability of
step ensures the versatility of our system, our solution.
accommodating various sources of input
data without compromising on security or In summary, our proposed system
efficiency. represents a significant advancement in
text encryption and decryption, offering a
Central to our encryption process is the seamless integration of image processing,
utilization of a cipher matrix, a cipher matrix methodology, and user-
mathematical construct that enables friendly GUI design. By bridging the gap
robust encryption through matrix between visual and textual information,
manipulation and permutation. This our solution stands poised to enhance
method not only enhances the security of security and confidentiality in digital
the encrypted text but also allows for communication across various domains
efficient decryption using inverse and user scenarios.
operations, ensuring that the original
message can be retrieved accurately.
2 Mathematical Representation :
A=
[ 23 71] …(Here matrix A is input matrix)
Now, consider key matrix as B
B=
[ 21 10] …(B is key matrix)
So when data is transferred from sender’s device ,it get encrypted as
B . A=
[21 10]x [ 23 71 ] …(pre-multiplication of matrix B with A)
BA=
[ 157 27 ] …(Encrypted matrix)
Now, data is being transferred ; at moment of receiving data ,it get decrypted as
B-1.(BA) ¿ −1[0 −1
2 ] [7 2
]
x 15 7 …(pre-multiplication with B-1 to encrypted matrix )
[2 7 ]
A = 3 1 …(we get original matrix of some text)
4 Conclusion :
5 References :
1) https://www.bing.com/ck/a?!
&&p=4654ae4d2b444348JmltdHM9MTcxNTA0MDAwMCZpZ3VpZD0wNDlhNjM1NS
00MzFhLTZiZGUtMTAwZS03MTBiNDJlMjZhZDAmaW5zaWQ9NTMwNQ&ptn=3&v
er=2&hsh=3&fclid=049a6355-431a-6bde-100e-
710b42e26ad0&psq=cryptography+research+paper&u=a1aHR0cHM6Ly9pZWVleHBsb3J
lLmllZWUub3JnL2RvY3VtZW50Lzk3NTYwNzg&ntb=1
2) (PDF) A Secure and Fast Approach for Encryption and Decryption of Message
Communication (researchgate.net)
3) Cryptography: Recent research trends of encrypting mathematics - ScienceDirect