Title:


Hill Cipher Cryptosystem over Complex Numbers


Author:


Mail Orcid Maxrizal Maxrizal(1*)

(1) STMIK Atma Luhur, Indonesia
(*) Corresponding Author
10.31002/ijome.v2i1.1217| Abstract views : 136 | PDF views : 0

Abstract


The Hill Cipher cryptosystem is a symmetry key cryptosystem. This cryptosystem uses the concept of integer over modulo p. This cryptosystem uses a matrix K as a secret key. We must choose the key matrix K which has an inverse in modulo p. This secret key matrix will be used by the sender and recipient of the message to encrypt and descript the message. For this reason, this paper will discuss the generalization of Hill Cipher using matrices over complex numbers. Calculation of determinants and inverses of the matrix K will adopt a system of determinant and inverse calculations on Hill Cipher. The results show that the proposed cryptosystem scrambles the plaintext.

Keywords


complex numbers; cryptosystem over complex numbers; Hill Cipher cryptosystem

Full Text:

PDF

References


Acharya, B., Sharma, M. D., Tiwari, S., & Minz, V. K. (2010). Privacy Protection of Biometric Traits Using Modified Hill Cipher with Involutory Key and Robust Cryptosystem. Procedia Computer Science, 2, 242–247. https://doi.org/10.1016/j.procs.2010.11.031

Anton, H., & Rorres, C. (2004). Elementary Linear Algebra: Applications Version. Wiley eGrade.

Dummit, D. S., & Foote, R. M. (2004). Abstract Algebra (3rd ed.). John Wiley & Sons Inc.

Khalaf, A. A. M., El-Karim, M. S. A., & Hamed, H. F. A. (2016). A Triple Hill Cipher Algorithm Proposed to Increase The Security of Encrypted Binary Data and its Implementation Using FPGA. ICACT Transactions on Advanced Communications Technology (TACT), 5(1), 752–759. https://doi.org/10.1109/ICACT.2016.7423615

Krishna, A. V. ., & Madhuravani, K. (2012). A Modified Hill Cipher Using Randomized Approach. International Journal of Computer Network and Information Security, 5, 56–62. https://doi.org/10.5815/ijcnis.2012.05.07

L, G. (2017). Modified Hill Cipher Based Image Encryption Technique. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(4), 342–345. https://doi.org/10.22214/ijraset.2017.4063

Lang, S. (1993). Linear Algebra. New York: Springer.

Reddy, K. A., Vishnuvardhan, B., Madhuviswanatham, & Krishna, A. V. N. (2012). A Modified Hill Cipher Based on Circulant Matrices. Procedia Technology, 4, 114–118. https://doi.org/10.1016/j.protcy.2012.05.016

Sastry, V. U. K., & Ravi, S. N. (2008). Modified Hill Cipher for a Large Block of Plaintext with Interlacing and Iteration. Journal of Computer Science, 4(1), 15–20. https://doi.org/10.3844/jcssp.2008.15.20




DOI: http://dx.doi.org/10.31002/ijome.v2i1.1217

Article Metrics

Abstract view : 136 times
PDF - 0 times

Cited By

Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Indonesian Journal of Mathematics Education

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

Indexed by:

             

ISSN: 2654-3907 (print) | 2654-346X (online)

Jalan Kapten Suparman No.39, Magelang, Jawa Tengah, Indonesia 56116

Phone (0293) 364113  Fax. (0293) 362438

Website : http://jurnal.untidar.ac.id/index.php/ijome