Research Article Open Access

A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes

A. F.A. Abidin1, O. Y. Chuan1 and M. R.K. Ariffin1
  • 1 ,
Journal of Computer Science
Volume 7 No. 5, 2011, 785-789

DOI: https://doi.org/10.3844/jcssp.2011.785.789

Submitted On: 30 March 2011 Published On: 7 May 2011

How to Cite: Abidin, A. F., Chuan, O. Y. & Ariffin, M. R. (2011). A Novel Enhancement Technique of the Hill Cipher for Effective Cryptographic Purposes. Journal of Computer Science, 7(5), 785-789. https://doi.org/10.3844/jcssp.2011.785.789

Abstract

Problem statement: The Hill cipher is the first polygraph cipher which has a few advantages in data encryption. However, it is vulnerable to known plaintext attack. Besides, an invertible key matrix is needed for decryption. It may become problematic since an invertible key matrix does not always exist. Approach: In this study, a robust Hill algorithm (Hill++) has been proposed. The algorithm is an extension of Affine Hill cipher. A random matrix key, RMK is introduced as an extra key for encryption. An algorithm proposed for involutory key matrix generation is also implemented in the proposed algorithm. Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. Conclusion/Recommendations: The proposed algorithm introduced a random matrix key which is computed based on the previous ciphertext blocks and a multiplying factor. A modified of Hill Cipher is free from the all-zero plaintext blocks vulnerability. Usage of involutory key for encryption and decryption managed to solve the non invertible key matrix problem. It also simplify the computational complexity in term of generating the inverse key matrix.

  • 2,009 Views
  • 4,001 Downloads
  • 3 Citations

Download

Keywords

  • Affine cipher
  • cryptography theory
  • hill cipher
  • involutory matrix
  • polygraph cipher
  • data encryption
  • symmetric cryptosystem
  • Advanced Encryption Standard (AES)
  • Data Encryption Standard (DES)
  • Initial Vector (IV)
  • proposed algorithm