| _version_ |
1860799935603015680
|
| building |
INTELEK Repository
|
| collection |
Online Access
|
| collectionurl |
https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072
|
| date |
2013-03-26 15:43:47
|
| format |
Restricted Document
|
| id |
7984
|
| institution |
UniSZA
|
| internalnotes |
[1] D. Luciano and G. Prichett, “From Caesar Ciphers to Public-Key Cryptosystem”, The College Mathematics Journal, vol. 12, no. 1, (1987), pp. 2-17. [2] M. Toorani and A. Falahati, “A Secure Variant of the Hill Cipher”, in Proc. 14th IEEE Symposium on Computers and Communications, Sousse, (2009), pp. 313-316. [3] M. Eisenberg, “Hill ciphers and modular linear algebra”, Mimeographed notes, University of Massachusetts, (1998). [4] I. A. Ismail, M. Amin and H. Diab, “How to repair the Hill Cipher”, Journal of Zhejiang University Science A, vol. 7, no. 12, (2006), pp. 2022-2030. [5] A. Bibhudendra, “Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security, vol. 1, no. 1, (2006), pp. 14-21. [6] Y. Rangel-Romero, G. Vega-García, A. Menchaca-Méndez, D. Acoltzi-Cervantes, L. Martínez-Ramos, M. Mecate-Zambrano, F. Montalvo-Lezama, J. Barrón-Vidales, N. Cortez-Duarte and F. Rodríguez-Henríquez, “Comments on How to repair the Hill cipher”, Journal of Zhejiang University Science A, vol. 9, no. 2, (2006), pp. 211-214. [7] A. H. Rushdi and F. Mousa, “Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher”, Int’l Journal of Computer Science and Network Security, vol. 9, no. 5, (2009), pp. 11-16. [8] D. R. Stinson, “Cryptography Theory and Practice”, 3rd edition. Chapman & Hall/CRC, (2006), pp. 13-37. [9] A. Bibhudendra, K. P. Saroj, K. P. Sarat and P. Ganapati, “Image Encryption using Advanced Hill Cipher Algorithm”, International Journal of Recent Trends in Engineering, vol. 1, no. 1, (2009), pp. 663-667. [10] I. E. Ziedan, M. M. Fouad and D. H. Salem, “Application of data encryption standard to bitmap and JPEG images”, in Proc. 12th National Radio Science conference, Cairo, (2003), pp. 1-8.
|
| originalfilename |
3811-01-FH02-FIK-14-01492.pdf
|
| person |
SERSC
|
| recordtype |
oai_dc
|
| resourceurl |
https://intelek.unisza.edu.my/intelek/pages/view.php?ref=7984
|
| spelling |
7984 https://intelek.unisza.edu.my/intelek/pages/view.php?ref=7984 https://intelek.unisza.edu.my/intelek/pages/search.php?search=!collection407072 Restricted Document Article Journal application/pdf 12 1.6 Adobe Acrobat Pro DC 20 Paper Capture Plug-in SERSC 2013-03-26 15:43:47 3811-01-FH02-FIK-14-01492.pdf UniSZA Private Access Cryptography: A New Approach of Classical Hill Cipher International Journal of Security and it's Application The Hill cipher is the first polygraph cipher which has some advantages in symmetric data encryption. However, it is vulnerable to known plaintext attack. Another setback is that an invertible key matrix is needed for decryption and it is not suitable for encrypting a plaintext consisting of zeroes. The objective of this work is to modify the existing Hill cipher to overcome these three issues. Studies on previous results showed that the existing Hill algorithms are not yet sufficient. Some of these algorithms are still vulnerable to known plaintext attack. On the other hand, some of these algorithms have better randomization properties and as a result they are more resistant against known plaintext attack. Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. Moreover, neither of these algorithms are suitable for all zeroes plaintext block encryption. In this paper, a robust Hill algorithm (Hill++) is proposed. The algorithm is an extension of the Affine Hill cipher. A random matrix key is introduced as an extra key for encryption. Moreover, an involuntary matrix key formulation is also implemented in the proposed algorithm. This formulation can produce an involuntary key where a same key can be used for both encryption and decryption. Testing on the proposed algorithm is carried out via two approaches, that is through comparative study and statistical analysis. Comparative study shows that Hill++ is resistant to all zeroes plaintext block encryption and does not face the non invertible key matrix problem as what was faced by the original Hill, AdvHill and HillMRIV algorithms. Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. Results from statistical analysis shows that Hill++ (when compared to Hill, AdvHill and HillMRIV algorithms) has the greatest maximum deviation value and its correlation coefficient value is the closest to zero. The results from these two measures proved that Hill++ has better encryption quality compared to HillMRIV. 7 2 179-190 [1] D. Luciano and G. Prichett, “From Caesar Ciphers to Public-Key Cryptosystem”, The College Mathematics Journal, vol. 12, no. 1, (1987), pp. 2-17. [2] M. Toorani and A. Falahati, “A Secure Variant of the Hill Cipher”, in Proc. 14th IEEE Symposium on Computers and Communications, Sousse, (2009), pp. 313-316. [3] M. Eisenberg, “Hill ciphers and modular linear algebra”, Mimeographed notes, University of Massachusetts, (1998). [4] I. A. Ismail, M. Amin and H. Diab, “How to repair the Hill Cipher”, Journal of Zhejiang University Science A, vol. 7, no. 12, (2006), pp. 2022-2030. [5] A. Bibhudendra, “Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm”, International Journal of Security, vol. 1, no. 1, (2006), pp. 14-21. [6] Y. Rangel-Romero, G. Vega-García, A. Menchaca-Méndez, D. Acoltzi-Cervantes, L. Martínez-Ramos, M. Mecate-Zambrano, F. Montalvo-Lezama, J. Barrón-Vidales, N. Cortez-Duarte and F. Rodríguez-Henríquez, “Comments on How to repair the Hill cipher”, Journal of Zhejiang University Science A, vol. 9, no. 2, (2006), pp. 211-214. [7] A. H. Rushdi and F. Mousa, “Design of a Robust Cryptosystem Algorithm for Non-Invertible Matrices Based on Hill Cipher”, Int’l Journal of Computer Science and Network Security, vol. 9, no. 5, (2009), pp. 11-16. [8] D. R. Stinson, “Cryptography Theory and Practice”, 3rd edition. Chapman & Hall/CRC, (2006), pp. 13-37. [9] A. Bibhudendra, K. P. Saroj, K. P. Sarat and P. Ganapati, “Image Encryption using Advanced Hill Cipher Algorithm”, International Journal of Recent Trends in Engineering, vol. 1, no. 1, (2009), pp. 663-667. [10] I. E. Ziedan, M. M. Fouad and D. H. Salem, “Application of data encryption standard to bitmap and JPEG images”, in Proc. 12th National Radio Science conference, Cairo, (2003), pp. 1-8.
|
| spellingShingle |
Cryptography: A New Approach of Classical Hill Cipher
|
| summary |
The Hill cipher is the first polygraph cipher which has some advantages in symmetric data encryption. However, it is vulnerable to known plaintext attack. Another setback is that an invertible key matrix is needed for decryption and it is not suitable for encrypting a plaintext consisting of zeroes. The objective of this work is to modify the existing Hill cipher to overcome these three issues. Studies on previous results showed that the existing Hill algorithms are not yet sufficient. Some of these algorithms are still vulnerable to known plaintext attack. On the other hand, some of these algorithms have better randomization properties and as a result they are more resistant against known plaintext attack. Nevertheless, these enhanced Hill cipher algorithms still face the non invertible key matrix problem. Moreover, neither of these algorithms are suitable for all zeroes plaintext block encryption. In this paper, a robust Hill algorithm (Hill++) is proposed. The algorithm is an extension of the Affine Hill cipher. A random matrix key is introduced as an extra key for encryption. Moreover, an involuntary matrix key formulation is also implemented in the proposed algorithm. This formulation can produce an involuntary key where a same key can be used for both encryption and decryption. Testing on the proposed algorithm is carried out via two approaches, that is through comparative study and statistical analysis. Comparative study shows that Hill++ is resistant to all zeroes plaintext block encryption and does not face the non invertible key matrix problem as what was faced by the original Hill, AdvHill and HillMRIV algorithms. Apart from this, the encryption quality of the proposed algorithm is also measured by using the maximum deviation and correlation coefficient factors. Results from statistical analysis shows that Hill++ (when compared to Hill, AdvHill and HillMRIV algorithms) has the greatest maximum deviation value and its correlation coefficient value is the closest to zero. The results from these two measures proved that Hill++ has better encryption quality compared to HillMRIV.
|
| title |
Cryptography: A New Approach of Classical Hill Cipher
|
| title_full |
Cryptography: A New Approach of Classical Hill Cipher
|
| title_fullStr |
Cryptography: A New Approach of Classical Hill Cipher
|
| title_full_unstemmed |
Cryptography: A New Approach of Classical Hill Cipher
|
| title_short |
Cryptography: A New Approach of Classical Hill Cipher
|
| title_sort |
cryptography: a new approach of classical hill cipher
|