Please use this identifier to cite or link to this item:
http://dx.doi.org/10.25673/120452
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | AL-Din Abed, Basim Najim | - |
dc.contributor.author | Majeed, Sundus Hatem | - |
dc.contributor.author | Mohamad, Mohamad Yamen AL | - |
dc.contributor.author | Hameed, Mohanad Abdulrahman | - |
dc.contributor.author | Abdullah, Jenan Najim | - |
dc.date.accessioned | 2025-08-29T09:02:51Z | - |
dc.date.available | 2025-08-29T09:02:51Z | - |
dc.date.issued | 2025-06 | - |
dc.identifier.uri | https://opendata.uni-halle.de//handle/1981185920/122408 | - |
dc.identifier.uri | http://dx.doi.org/10.25673/120452 | - |
dc.description.abstract | Cryptography plays a significant role in protecting privacy and secrecy in modern communications. The paper describes a novel text encrypt and decrypt scheme based on LU Matrix Decomposition, a numerical method. The scheme uses a key in the form of a invertible square matrix in order to encrypt and decrypt the text. It is broken down into lower triangular (L) and upper triangular (U) matrices. The text is reduced to numerical vectors, encrypted through L and U matrix transforms, and thereafter decrypted through their inverses. This method yields a systematic and secure process of encryption based on the intrinsic complexity of calculations in a matrix to secure the cryptographic process. The method is made calculational efficient with the efficient LU decomposition methods available in state-of-the-art numerical toolsets. Practical implementation issues such as block length and padding schemes are considered in order to handle variable text lengths. The paper evaluates the performance and security of the LU matrix crypto system and predicts and how the system would play a viable role in securing information in resource-constrained scenarios. The method demonstrates a singular combination of linear algebra and cryptography and opens the door for other research in inscriptive techniques based on matrices. While the method boasts strong confidentiality and operational efficiency, enhancements should preferably be made in the area of integrity verification and post-quantum security. | - |
dc.format.extent | 1 Online-Ressource (12 Seiten) | - |
dc.language.iso | eng | - |
dc.rights.uri | https://creativecommons.org/licenses/by-sa/4.0/ | - |
dc.subject.ddc | DDC::6** Technik, Medizin, angewandte Wissenschaften | - |
dc.title | Mathematical Model Using LU Decomposition as Cryptographic System | - |
local.versionType | publishedVersion | - |
local.publisher.universityOrInstitution | Hochschule Anhalt | - |
local.openaccess | true | - |
dc.identifier.ppn | 1934660051 | - |
cbs.publication.displayform | 2025 | - |
local.bibliographicCitation.year | 2025 | - |
cbs.sru.importDate | 2025-08-29T09:02:03Z | - |
local.bibliographicCitation | Enthalten in Proceedings of the 13th International Conference on Applied Innovations in IT - Koethen, Germany : Edition Hochschule Anhalt, 2025 | - |
local.accessrights.dnb | free | - |
Appears in Collections: | International Conference on Applied Innovations in IT (ICAIIT) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
2-8-ICAIIT_2025_13(2).pdf | 1.2 MB | Adobe PDF | ![]() View/Open |