P.Sai Tejesh
12bce0359
VIT University
Ph. No: 7502935512
Abstract :
Cryptography is the study of encoding and decoding secret messages. In the information age, cryptography has become one of the major methods for protection in all applications like cloud computing, mobile security. It allows people to do business electronically without worries of deceit and deception.
When people started doing business online and needed to transfer funds electronically, the applications of cryptography for integrity began to surpass its use for secrecy .The constant increase of information transmitted electronically has lead to an increased reliance on cryptography and authentication. An obvious application of cryptography is the transformation of information to prevent other from observing its meaning. Secure communication is the most straightforward use of cryptography. Two people may communicate securely by encrypting the messages sent between them. The paper presents modifications of the Hill cipher generating dynamic encryption key matrix
Index Terms—Hill cipher, Matrix encryption, Permutation matrix
NOMENCLATURE :
Introduction:
INTRODUCTION
The Hill cipher (HC) algorithm [1] is one of the famous and known symmetric algorithms in the field of cryptography. HC is computationally attractive as using multiplication of a key matrix. HC has several advantages such as masquerading letter frequencies of the plaintext and high throughput [2, 3]. . Despite the ease and speed of the HC, the original HC is no longer used due to the vulnerability against known plaintext-cipher text attack [3].
Recent research and development efforts have been done to improve the security of HC. HC modification [4], HCM-PT, uses a dynamic key matrix obtained by random permutations of rows and columns from the master key matrix and transfers an HC-encrypted permutation to the receiving side. Thus, in HCM-PT, each plaintext vector
References: : 1. Saeednia, S., “How to Make the Hill Cipher Secure”, Cryptologia, 24(4):pp. 353-360, 2000. 2. Mahmoud, A. Y., Chefranov, A. G., “Hill Cipher Modification Based on Eigenvalues HCM-EE”, in Proc. 2nd Int. Conf. Security of Information and Networks (SIN2009), Gazimagusa (TRNC) North Cyprus, Elci, A., Orgun, M., and Chefranov, A. (Eds.), ACM, New York, USA, pp. 164-167, 2009. 3. Application to Cryptography from the site http://aix1.uottawa.ca/~jkhoury/cryptography.htm