E-resources
Peer reviewed
Open access
-
Salman, Saba; Yasmin Makki Mohialden; Abbas Abdulhameed; Nadia Mahmood Hussien
Iraqi Journal for Computer Science and Mathematics, 02/2024, Volume: 5, Issue: 1Journal Article
Cryptographic tools like Hill's encryption algorithm protect digital data. In this work, we present a novel Hill cipher security method that utilizes Gaussian integers from number theory. Using these intriguing mathematical entities to disguise plaintext values dramatically boosts assault resistance and duration. This research includes a three-pass protocol for encryption and decryption without key exchange, ensuring a safe, efficient, and dependable solution. Pandas is used for efficient data processing, and Numpy for computational tasks, notably matrices. Hill cipher-based encryption and decryption can be utilized in real life. It also demonstrates how to save Pandas DataFrame data to Excel. This strategy assures progress in cryptography. Uniquely designed for banking, it emphasizes its applicability and possible influence on present financial systems.
![loading ... loading ...](themes/default/img/ajax-loading.gif)
Shelf entry
Permalink
- URL:
Impact factor
Access to the JCR database is permitted only to users from Slovenia. Your current IP address is not on the list of IP addresses with access permission, and authentication with the relevant AAI accout is required.
Year | Impact factor | Edition | Category | Classification | ||||
---|---|---|---|---|---|---|---|---|
JCR | SNIP | JCR | SNIP | JCR | SNIP | JCR | SNIP |
Select the library membership card:
If the library membership card is not in the list,
add a new one.
DRS, in which the journal is indexed
Database name | Field | Year |
---|
Links to authors' personal bibliographies | Links to information on researchers in the SICRIS system |
---|
Source: Personal bibliographies
and: SICRIS
The material is available in full text. If you wish to order the material anyway, click the Continue button.