Cryptographic Algorithm Using Matrix Inversion as Data Protection

This study aimed at providing algorithms to secure sensitive information in store or in transit via unsecure channels from the hands of the Internet criminals by scrambling the sensitive information into a set of linear equations in matrix form and deciphering by solving the systems of the linear eq...

Full description

Saved in:
Bibliographic Details
Main Authors: Zirra, Peter B., Wajiga, G.M.
Format: Article
Language:English
Published: Universiti Utara Malaysia Press 2011
Subjects:
Online Access:https://repo.uum.edu.my/id/eprint/30438/1/JICT%2010%2000%202011%2067-83.pdf
https://repo.uum.edu.my/id/eprint/30438/
https://e-journal.uum.edu.my/index.php/jict/article/view/8109
Tags: Add Tag
No Tags, Be the first to tag this record!