Bitte benutzen Sie diese Kennung, um auf die Ressource zu verweisen: http://dx.doi.org/10.25673/120452
Titel: Mathematical Model Using LU Decomposition as Cryptographic System
Autor(en): AL-Din Abed, Basim Najim
Majeed, Sundus Hatem
Mohamad, Mohamad Yamen AL
Hameed, Mohanad Abdulrahman
Abdullah, Jenan Najim
Körperschaft: Hochschule Anhalt
Erscheinungsdatum: 2025-06
Umfang: 1 Online-Ressource (12 Seiten)
Sprache: Englisch
Zusammenfassung: Cryptography plays a significant role in protecting privacy and secrecy in modern communications. The paper describes a novel text encrypt and decrypt scheme based on LU Matrix Decomposition, a numerical method. The scheme uses a key in the form of a invertible square matrix in order to encrypt and decrypt the text. It is broken down into lower triangular (L) and upper triangular (U) matrices. The text is reduced to numerical vectors, encrypted through L and U matrix transforms, and thereafter decrypted through their inverses. This method yields a systematic and secure process of encryption based on the intrinsic complexity of calculations in a matrix to secure the cryptographic process. The method is made calculational efficient with the efficient LU decomposition methods available in state-of-the-art numerical toolsets. Practical implementation issues such as block length and padding schemes are considered in order to handle variable text lengths. The paper evaluates the performance and security of the LU matrix crypto system and predicts and how the system would play a viable role in securing information in resource-constrained scenarios. The method demonstrates a singular combination of linear algebra and cryptography and opens the door for other research in inscriptive techniques based on matrices. While the method boasts strong confidentiality and operational efficiency, enhancements should preferably be made in the area of integrity verification and post-quantum security.
URI: https://opendata.uni-halle.de//handle/1981185920/122408
http://dx.doi.org/10.25673/120452
Open-Access: Open-Access-Publikation
Nutzungslizenz: (CC BY-SA 4.0) Creative Commons Namensnennung - Weitergabe unter gleichen Bedingungen 4.0 International(CC BY-SA 4.0) Creative Commons Namensnennung - Weitergabe unter gleichen Bedingungen 4.0 International
Enthalten in den Sammlungen:International Conference on Applied Innovations in IT (ICAIIT)

Dateien zu dieser Ressource:
Datei Beschreibung GrößeFormat 
2-8-ICAIIT_2025_13(2).pdf1.2 MBAdobe PDFMiniaturbild
Öffnen/Anzeigen