Privacy protection of biometric traits using modified hill cipher with involutory key and robust cryptosystem

Abstract In this paper we have proposed a technique for securing biometric traits using the modified Hill Cipher with an involutory key and a robust cryptosystem. The Modified Hill Cipher solves the drawbacks of conventional Hill ciphers by using iterations and interlacing. Interlacing of the binary bits of the plaintext image creates confusion while iterations create complexity to the cipher image. The Modified Hill cipher is secure to known plaintext. Binary conversion is only possible for integer elements so an integer involutory key matrix is used. As the key matrix is involutory, which eliminates necessity of matrix inverse while decryption. We have used a robust cryptosystem algorithm to send the cipher matrix safely. The cryptanalysis and histogram graphs show the variation of image property before and after encryption.

[1]  Saroj Kumar Panigrahy,et al.  H-S-X Cryptosystem and Its Application to Image Encryption , 2009, 2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies.

[2]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[3]  V. U.K. Sastry,et al.  Modified Hill Cipher for a Large Block of Plaintext with Interlacing and Iteration , 2008 .

[4]  Charlie Obimbo,et al.  A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption , 2007, The Journal of Supercomputing.

[5]  William Stallings,et al.  Cryptography and network security , 1998 .

[6]  Ganapati Panda,et al.  Invertible, Involutory and Permutation Matrix Generation Methods for Hill Cipher System , 2009, 2009 International Conference on Advanced Computer Control.

[7]  Saroj Kumar Panigrahy,et al.  Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm , 2007 .

[8]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[9]  Alper Kanak BIOMETRICS FOR COMPUTER SECURITY AND CRYPTOGRAPHY , 2004 .

[10]  Mousa Farajallah,et al.  Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher , 2009 .

[11]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[12]  G. R. Blakley Twenty years of cryptography in the open literature , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).