A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes
Abstract
Problem statement: The Hill cipher is the first polygraph cipher which has a few advantages in data encryption. However, it is vulnerable to known plaintext attack. Besides, an invertible key matrix is needed for decryption. It may become problematic since an invertible key matrix does not always exist. Approach: In this study, a robust Hill algorithm (Hill++) has been proposed. The algorithm is an extension of Affine Hill cipher. A random matrix key, RMK is introduced as an extra key for encryption. An algorithm proposed for involutory key matrix generation is also implemented in the proposed algorithm. Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. Conclusion/Recommendations: The proposed algorithm introduced a random matrix key which is computed based on the previous ciphertext blocks and a multiplying factor. A modified of Hill Cipher is free from the all-zero plaintext blocks vulnerability. Usage of involutory key for encryption and decryption managed to solve the non invertible key matrix problem. It also simplify the computational complexity in term of generating the inverse key matrix.
DOI: https://doi.org/10.3844/jcssp.2011.785.789
Copyright: © 2011 A. F.A. Abidin, O. Y. Chuan and M. R.K. Ariffin. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 4,648 Views
- 5,504 Downloads
- 8 Citations
Download
Keywords
- Affine cipher
- cryptography theory
- hill cipher
- involutory matrix
- polygraph cipher
- data encryption
- symmetric cryptosystem
- Advanced Encryption Standard (AES)
- Data Encryption Standard (DES)
- Initial Vector (IV)
- proposed algorithm