2021
DOI: 10.24042/ajpm.v12i2.10469
|View full text |Cite
|
Sign up to set email alerts
|

Unimodular matrix and bernoulli map on text encryption algorithm using python

Abstract: One of the encryption algorithms is the Hill Cipher. The square key matrix in the Hill Cipher method must have an inverse modulo. The unimodular matrix is one of the few matrices that must have an inverse. A unimodular matrix can be utilized as a key in the encryption process. This research aims to demonstrate that there is another approach to protect text message data. Symmetric cryptography is the sort of encryption utilized. A Bernoulli Map is used to create a unimodular matrix. To begin, the researchers us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 11 publications
0
7
1
Order By: Relevance
“…It categorizes Indonesian tweets into three categories: no hate speech, abusive but not hate speech, and abusive and hate speech. However, like previous studies on hate speech and abusive language identification, it does not explain why a tweet is deemed a hateful message [14].…”
Section: Introductioncontrasting
confidence: 58%
“…It categorizes Indonesian tweets into three categories: no hate speech, abusive but not hate speech, and abusive and hate speech. However, like previous studies on hate speech and abusive language identification, it does not explain why a tweet is deemed a hateful message [14].…”
Section: Introductioncontrasting
confidence: 58%
“…The following is a simple example of the process of encrypting and decrypting audio files with mp3 format and assumed named B.mp3. Briefly, the file will be converted into a matrix and will be multiplied by a key matrix (unimodular) during encryption and will be multiplied by the inverse of the key matrix during decryption [7], [31], [32].…”
Section: Figure 2 Illustration Of Research Methodsmentioning
confidence: 99%
“…The following Figure 5 is a glimpse of the created program, which loads four algorithm main, namely Algorithm 1 for generating logistic map sequences, Algorithm 2 for generating a unimodular matrix (Key), Algorithm 3 for the Encryption process, and Algorithm 4 for Decryption process[1], [7]. A more complete program code can be seen at the following link: https://colab.research.google.com/drive/10a3WBsLhGIE 2XbH8vd9UbwtdEA98LwNy?usp=sharing.…”
Section: Device Name Desktop-bubm123 Processormentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, we will also perform statistical analysis and execution time measurements to test the encryption strength of these two methods. It is hoped that this research can provide a better understanding of the application of Unimodular Hill Cipher and RSA in text encryption using Python (Zhang, 2020;Arifin et al, 2021a).…”
Section: Introductionmentioning
confidence: 99%