Applying Cryptographic Algorithm in C language : A Matrix-Based Approach to Securing Data

Authors

  •   Seema Nair Assistant Professor, Faculty of Mathematics and Statistics - Brihan Maharashtra College of Commerce, 845, Shivajinagar, Pune - 411 004, Maharashtra
  •   Amruta Jog Assistant Professor, Faculty of Computer Programming - Brihan Maharashtra College of Commerce, 845, Shivajinagar, Pune, Maharashtra - 411 004

DOI:

https://doi.org/10.17010/ijcs/2024/v9/i5/174647

Keywords:

Cryptography

, C-programming, History of cryptography, Matrices, Modern Cryptography.

Paper Submission Date

, August 16, 2024, Paper sent back for Revision, August 29, Paper Acceptance Date, September 3, Paper Published Online, October 5, 2024

Abstract

In today's digital era, the significance of Cryptography in Cybersecurity has grown tremendously. Cryptography is vital for safeguarding sensitive information and enabling secure communication even in the presence of potential threats. By securing data exchanges over untrusted networks such as the Internet, Cryptography protects online transactions, personal data, and confidential communication, thereby reinforcing digital trust. The present paper explores the evolution of Cryptography from its historical roots to its modern applications in digital communication security. While highlighting the mathematical principles behind Cryptographic algorithms, our focus shifts to the practical implementation of encryption and decryption using the C programming language. Based on matrices, the algorithm is executed in C language to showcase its real-world applicability. Various examples are presented to validate the code alongwith a discussion of its limitations and the potential for expanding its scope in future research. Though the current implementation is restricted to 3-dimensional invertible square matrices, the approach can be scaled to accommodate any n-dimensional invertible square matrix. While mathematics provides the foundation, the focus is on how C programming enables the practical implementation of cryptographic techniques in digital security.

Downloads

Download data is not yet available.

Published

2024-10-05

How to Cite

Nair, S., & Jog, A. (2024). Applying Cryptographic Algorithm in C language : A Matrix-Based Approach to Securing Data. Indian Journal of Computer Science, 9(5). https://doi.org/10.17010/ijcs/2024/v9/i5/174647

References

M. Artin, Algebra. New Delhi: Prentice-Hall of India Pvt. Ltd., 1996.

E. Balagurusamy, Programming in C. New Delhi, India: Tata McGraw Hill, 1990.

"Cryptography: How it helps in our digital world." Analog Devices. [Online]. Available: https://www.analog.com/en/resources/technical-articles/cryptography-how-it-helps-in-our-digital-world.html

"History of Cryptography." Digicert. [Online]. Available: https://www.digicert.com/blog/the-history-of-cryptography

M. Dixit, "Mathematics in Cryptography: Securing the digital world." Sage University Bhopal. [Online]. Available: https://sageuniversity.edu.in/blogs/mathematics-in-cryptography-securing-the-digital-world

"Cryptography introduction." geeksforgeeks. [Online]. Available: https://www.geeksforgeeks.org/cryptography-introduction/

N. Goel, "Cryptography and Network Security." naukri.com. [Online]. Available: https://www.naukri.com/code360/library/cryptography-and-network-security

"What is cryptography?" IBM.com. [Online]. Available: https://www.ibm.com/topics/cryptography

Y. Kanetkar, Let Us C. India: BPB Publication, 2017.

D. Cooke, "Matrix Algebra and Applications." math.utep.edu. [Online]. Available: https://math.utep.edu/faculty/cmmundy/Math%202301/0495292974_CHPT_03.pdf

D. McClelland, D. Perilla, A. Clark, and D. Lopez, "Cryptography and Linear Algebra." home.csulb.edu. [Online]. Available: https://home.csulb.edu/~jchang9/m247/m247_fa11_David_Diego_Alissa_Daniel.pdf

J. Pugliano and B. Sehestedt, "Cryptography: Matrices and encryption." math.utah.edu. [Online]. Available: https://www.math.utah.edu/~gustafso/s2017/2270/projects-2017/joePuglianoBrandonSehestedt/LinearAlgebra_Project.pdf

Ravikiran A. S., "Getting Started with C Programming: A Beginner’s Guide!" Simplilearn.com. [Online]. Available: https://www.simplilearn.com/tutorials/c-tutorial/use-of-c-language

J. Schneider, "A brief history of cryptography: Sending secret messages throughout time." IBM.com. [Online]. Available: https://www.ibm.com/think/topics/cryptography-history

J. Schneider, "Cryptography use cases: From secure communication to data security." IBM.com. [Online]. Available: https://www.ibm.com/think/topics/cryptography-use-cases

R. Sekhon and R. Bloom, "Application of matrices in Cryptography." LibreTexts Mathematics. [Online]. Available:https://math.libretexts.org/Bookshelves/Applied_Mathematics/Applied_Finite_Mathematics_(Sekhon_and_Bloom)/02%3A_Matrices/2.05%3A_Application_of_Matrices_in_Cryptography

M. Somashekara, Programming in C. Delhi, India: Prentice-Hall of India Pvt. Ltd.