Professional Documents
Culture Documents
Reddy 2nd Review
Reddy 2nd Review
Abstract
Functional Requirements
Non-Functional Requirements
Conclusion
ABSTRACT
One of the cryptographic approaches is the Hill Cipher. A square key matrix must have an
inverse modulo in the Hill Cipher algorithm. The unimodular matrix is one of the special matrices
that has an inverse. In the encryption process, a unimodular matrix can be utilized as a key
matrix. The goal of this study is to demonstrate a safe digital image data alternative. Symmetric
cryptography is the type of encryption utilized. The described approach uses a Logistic Map to
construct a unimodular matrix. The encryption mechanism in this is modulo matrix
multiplication. Because an incomplete partition may arise as a result of a file . Especially if the size
is a large prime integer. The results that the photo are well encrypted and difficult for third parties
to decrypt. This encryption methods also assures that the encrypted and decrypted file sizes are
identical to the original file sizes. As a result, the Hill cipher works well with the combination of
these techniques for encrypting digital images.
.
Functional Requirements
Encryption
Input : Image Pixels,
Decryption
Input : Encrypt Image,
Hardware Requirements
Processor : Intel i3 & Above
RAM : 4 GB
Hard disk : 500 GB
Keyboard : Standard 102 Keys
Mouse : Standard
Software Requirements:
Operating system : Windows 7 & Above
Front-end/GUI tool : Python IDLE 3.10.4.
Programming language : Python Programming
Non-Functional Requirements
● Usability: The GUI of this system provides easy access to the user and user can get best results for the given
input.
● Performance: It display the correct result based on the output for all possible correct inputs at all times when
the computer is in proper condition.
● Reliability: This system will perform its intended function adequately for a specific period of time.
● Maintainability: This system can adapt any technology and can detect errors.
● Portability: This system can work on windows operating system environment with minimal changes.
Use-case diagram for User and Image Encryptior
Sequence diagram for User
Sequence diagram for Image Encryptior
State chart diagram for User
State chart diagram for Image Encryptior
CONCLUSION
The conclusion is that, The standard hill cipher usually uses a small K_n, n≤4 key matrices
because of the difficulty of finding a reversible matrix. Furthermore, if n>4 uses the
standard Hill cipher, it takes the entire K_ n matrix as the key. In this paper, we create a
Unimodular matrix using a custom logistic function as a key that can solve this problem.
That is n>4 but only takes 2 parameters password 1 and password. The combination of Hill
Cipher makes encrypted files more secure. The capacity does not affect the length of
encryption time, which affects password1, because it is related to the key matrix size of