Preview

Hill Cipher

Better Essays
Open Document
Open Document
2825 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hill Cipher
HILL CIPHER
TERM-PAPER

3/31/2013
LPU
vidit

Name: Vidit kumar Singh.
Reg no: 11009010
Roll no: B38.
Cap : 323.
Sub : Information Security and privacy.

INDEX

Introduction Workings Decryption Matrix Inverse Hill ciphers that encipher larger blocks Ciphertext Attack Known plaintext attack Security Key size Diffusion and Confusion Conclusion References

Hill Cipher
Introduction
Invented by Lester S. Hill in 1929, the Hill cipher is a polygraphic substitution cipher based on linear algebra. Hill used matrices and matrix multiplication to mix up the plaintext.
To counter charges that his system was too complicated for day to day use, Hill constructed a cipher machine for his system using a series of geared wheels and chains. However, the machine never really sold. [1]
Hill's major contribution was the use of mathematics to design and analyse cryptosystems. It is important to note that the analysis of this algorithm requires a branch of mathematics known as number theory .Many elementary number theory text books deal with the theory behind the Hill cipher, with several talking about the cipher in detail (e.g. Elementary Number Theory and its applications, Rosen, 2000). It is advisable to get access to a book such as this, and to try to learn a bit if you want to understand this algorithm in depth. [2]
Each letter is represented by a number modulo 26. (Often the simple scheme A = 0, B = 1, ..., Z = 25 is used, but this is not an essential feature of the cipher.) To encrypt a message, each block of n letters (considered as an n-component vector) is multiplied by an invertible n × n matrix, again modulus 26. To decrypt the message, each block is multiplied by the inverse of the matrix used for encryption.
The matrix used for encryption is the cipher key, and it should be chosen randomly from the set of invertible n × n matrices (modulo 26). The cipher can, of course, be adapted to an alphabet

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Report

    • 288 Words
    • 2 Pages

    Step 6 : Break the input string into square matrices of maximum possible size of…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Nt1310 Unit 1 Assignment

    • 1994 Words
    • 8 Pages

    For example, the capital letter A is ASCII character 65, the numeral 2 is ASCII 50, the character} is ASCII 125 and the metacharacter carriage return is ASCII 13. Systems based on ASCII use seven bits to represent these values digitally. In contrast, most computers store data in memory organized in eight-bit bytes. Files that contain machine-executable code and non-textual data typically contain all 256 possible eight-bit byte values. Many computer programs came to rely on this distinction between seven-bit text and eight-bit binary data, and would not function properly if non-ASCII characters appeared in data that was expected to include only ASCII text. For example, if the value of the eighth bit is not preserved, the program might interpret a byte value above 127 as a flag telling it to perform some function. It is often desirable, however, to be able to send non-textual data through text-based systems, such as when one might attach an image file to an e-mail message. To accomplish this, the data is encoded in some way, such that eight-bit data is encoded into seven-bit ASCII characters (generally using only alphanumeric and punctuation characters—the ASCII printable characters). Upon safe arrival at its destination, it is then…

    • 1994 Words
    • 8 Pages
    Better Essays
  • Good Essays

    In the year 1822 a British mathematician named Babbage designed the first mechanical calculator-computer for adding and subtracting numbers called the “difference engine”. It was like a train and was designed to operate with steam, and took 10 years to build just one part of the…

    • 490 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Dbq on Prohibition

    • 805 Words
    • 4 Pages

    The prohibition movement in the United States was very successful during the era of progressive reform, from 1900 to 1919. This is because of the social composition of the prohibitionists, their motives, strategy, and pressure-group tactics, and the relationship of prohibitionism to progressive reform. The prohibitionists attacked saloons with a passion, they appealed to women's rights, and they tried every mean possible to keep their areas ‘dry.'…

    • 805 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    How did it work: The enigma machine was a very complicated device. On the inside of the machine there were three rotors that contained all 26 letters of the alphabet. What would happen was that when someone would press a letter on the keyboard, a different letter would pop up on the paper, such as A for E, D for G, F for Z, and so on. These substitutions occur because of the positions of the rotors on the inside of the machine. The rotors are first situated at any random letter in the alphabet and when the button is pressed, the letter that is at the beginning of the rotor is put onto the paper. Then if the same letter were to be pressed again, a different letter would appear because the rotor will have changed position. The fully typed and encoded message would be printed out and mailed to the person it was designated to and then that person would put in that code into their enigma machine and that machine would decipher the encoded message.…

    • 3634 Words
    • 15 Pages
    Better Essays
  • Satisfactory Essays

    Alan Turing, founder of computer science, mathematician, philosopher, codebreaker, and visionary before his time (Hodges, 1995). Turing is known for developing the proof which states that automatic computation cannot solve all mathematical problems, concept also known as the Turing machine (BBC History), he played a vital role in deciphering messages encrypted by the German Enigma machine during WW II. Arguably the first person to design a digital computer, Turing found happiness in solving what others considered impossible or unbreakable. He was an eccentric and solitary man, never satisfied with what is but constantly striving to figure out what is to come.…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ter verkrijging van de graad van doctor aan de Technische Universiteit Eindhoven, op gezag van de Rector Magnificus, prof.dr. R.A. van Santen, voor een commissie aangewezen door het College voor Promoties in het openbaar te verdedigen op 6 juni 2003 om 16.00 uur…

    • 21377 Words
    • 86 Pages
    Powerful Essays
  • Good Essays

    The Vigenère cipher is a method of encrypting alphabetic text by using a key known as a running key, which is generated by a keyword. In a Caesar cipher, we have to shift every letter of the alphabet with other number of places The Vigenère cipher consists of many Caesar ciphers in sequence with different shift values.…

    • 1692 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Alan Turing Presentation

    • 695 Words
    • 3 Pages

    2) Indicator: Chose 3 letters at random. Type in 3 letters two times to encode message. - Sender: send Indicator and encoded message. - Receiver: with the rotors are set to the specified wheel order - Type in encoded message - set the rotors to the 3 letters that light up on lamp board.  Type in encoded message to get message in plain text. • Important: if the same letter was pressed multiple times, a different letter would light up on the lamp board each time. *This proved to be the weakness of the Enigma machine.*…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    [2] Joan Daemen, Vincent Rijmen, "The Block Cipher Rijndael", Proceeding CARDIS '98 Proceedings of the The International Conference on Smart Card Research and Applications, pp: 277 - 284, 2000.…

    • 2501 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Briefly explain - a. classification of crypt analysis attack. B. DES algorithm in detail (10+10 =20 Marks)…

    • 713 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Cryptanalysis

    • 1790 Words
    • 8 Pages

    Cryptanalysis is the study of defeating the methods generated by cryptography. The aim is to find out some flaws in a cryptographic scheme. Cryptology is the combined study of both cryptography and cryptanalysis.…

    • 1790 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    6th Sense Technology

    • 951 Words
    • 4 Pages

    * Asymmetric Cryptosystems use a public key to encrypt and a private key to decrypt…

    • 951 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Character Encoding

    • 1485 Words
    • 9 Pages

    Assume six Chinese characters are placed in a 6×6 table and in particular in the 6 positions specified below, what binary values can be assigned to these 6 characters according to the given two-dimensional code space?…

    • 1485 Words
    • 9 Pages
    Satisfactory Essays