Please use this identifier to cite or link to this item: http://dx.doi.org/10.25673/120452
Title: Mathematical Model Using LU Decomposition as Cryptographic System
Author(s): AL-Din Abed, Basim Najim
Majeed, Sundus Hatem
Mohamad, Mohamad Yamen AL
Hameed, Mohanad Abdulrahman
Abdullah, Jenan Najim
Granting Institution: Hochschule Anhalt
Issue Date: 2025-06
Extent: 1 Online-Ressource (12 Seiten)
Language: English
Abstract: Cryptography plays a significant role in protecting privacy and secrecy in modern communications. The paper describes a novel text encrypt and decrypt scheme based on LU Matrix Decomposition, a numerical method. The scheme uses a key in the form of a invertible square matrix in order to encrypt and decrypt the text. It is broken down into lower triangular (L) and upper triangular (U) matrices. The text is reduced to numerical vectors, encrypted through L and U matrix transforms, and thereafter decrypted through their inverses. This method yields a systematic and secure process of encryption based on the intrinsic complexity of calculations in a matrix to secure the cryptographic process. The method is made calculational efficient with the efficient LU decomposition methods available in state-of-the-art numerical toolsets. Practical implementation issues such as block length and padding schemes are considered in order to handle variable text lengths. The paper evaluates the performance and security of the LU matrix crypto system and predicts and how the system would play a viable role in securing information in resource-constrained scenarios. The method demonstrates a singular combination of linear algebra and cryptography and opens the door for other research in inscriptive techniques based on matrices. While the method boasts strong confidentiality and operational efficiency, enhancements should preferably be made in the area of integrity verification and post-quantum security.
URI: https://opendata.uni-halle.de//handle/1981185920/122408
http://dx.doi.org/10.25673/120452
Open Access: Open access publication
License: (CC BY-SA 4.0) Creative Commons Attribution ShareAlike 4.0(CC BY-SA 4.0) Creative Commons Attribution ShareAlike 4.0
Appears in Collections:International Conference on Applied Innovations in IT (ICAIIT)

Files in This Item:
File Description SizeFormat 
2-8-ICAIIT_2025_13(2).pdf1.2 MBAdobe PDFThumbnail
View/Open